Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey

Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices with the capability to adapt their operating parameters on the fly based on the radio environment, to utilize the scarce radio frequency spectrum in an efficient and opportunistic manner. However, due to the increasingly pervasive existence of smart wireless devices in cognitive radio networks (CRNs), CR systems are vulnerable to numerous security threats that affect the overall performance. There have been many significant advances on security threats and countermeasures in CRNs in the past few years. Our main goal in this paper is to present the state-of-the-art research results and approaches proposed for CRN security to protect both unlicensed secondary users and licensed primary users. Specifically, we present the recent advances on security threats/attacks and countermeasures in CRNs focusing more on the physical layer by categorizing them in terms of their types, their existence in the CR cycle, network protocol layers (exploited during their activities and defense strategies), and game theoretic approaches. The recent important attacks and countermeasures in CRNs are also summarized in the form of tables. We also present recommendations that can be followed while implementing countermeasures to enhance CRN security. With this paper, readers can have a more thorough understanding of CRN security attacks and countermeasures, as well as research trends in this area.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Robert Benjamin Security considerations in communications systems and networks , 1990 .

[4]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[5]  C. Aliprantis,et al.  Games and Decision Making , 1999 .

[6]  R. Hunt,et al.  TCP/IP security threats and attack methods , 1999, Comput. Commun..

[7]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[8]  Eric van Damme,et al.  Non-Cooperative Games , 2000 .

[9]  Vipul Gupta,et al.  Freeze-TCP: a true end-to-end TCP enhancement mechanism for mobile environments , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[10]  Ueli Maurer,et al.  Secret-key agreement over unauthenticated public channels III: Privacy amplification , 2003, IEEE Trans. Inf. Theory.

[11]  I. Motivation,et al.  Secret-Key Agreement Over Unauthenticated Public Channels—Part III: Privacy Amplification , 2003 .

[12]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[13]  Ueli Maurer,et al.  Secret-key agreement over unauthenticated public channels II: the simulatability condition , 2003, IEEE Trans. Inf. Theory.

[14]  Ueli Maurer,et al.  Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.

[15]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[16]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[17]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[18]  Wade Trappe,et al.  TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[19]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[20]  Yonghong Zeng,et al.  Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Transactions on Wireless Communications.

[21]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part I: Two User Networks , 2007, IEEE Transactions on Wireless Communications.

[22]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[23]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part II: Multiuser Networks , 2007, IEEE Transactions on Wireless Communications.

[24]  Carlo S. Regazzoni,et al.  Spectrum sensing: A distributed approach for cognitive terminals , 2007, IEEE Journal on Selected Areas in Communications.

[25]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[26]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[27]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[28]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[29]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[30]  A. Sahai,et al.  Crime and Punishment for Cognitive Radios , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[31]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[32]  H. Vincent Poor,et al.  A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.

[33]  Gongjun Yan,et al.  Game Theory for Resource Allocation in Wireless Networks , 2010 .

[34]  Kang G. Shin,et al.  Cognitive radios for dynamic spectrum access: from concept to reality , 2010, IEEE Wireless Communications.

[35]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[36]  Majid Khabbazian,et al.  Malicious User Detection in a Cognitive Radio Cooperative Sensing System , 2010, IEEE Transactions on Wireless Communications.

[37]  Zhu Han,et al.  Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.

[38]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[39]  Jack Burbank Security in Cognitive Radio Networks , 2010 .

[40]  Hisato Iwai,et al.  Secret Key Agreement Based on Radio Propagation Characteristics in Two-Way Relaying Systems , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[41]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[42]  T. Charles Clancy,et al.  Physical Layer Authentication Watermarks through Synthetic Channel Emulation , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[43]  Zehua Gao,et al.  Secure Cooperative Spectrum Trading in Cognitive Radio Networks: A Reversed Stackelberg Approach , 2010, 2010 International Conference on Multimedia Communications.

[44]  K. J. Ray Liu,et al.  Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.

[45]  Peng Ning,et al.  Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.

[46]  Juan Hernández-Serrano,et al.  Modeling the Lion Attack in Cognitive Radio Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[47]  A. Robert Calderbank,et al.  The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach , 2011, IEEE Transactions on Information Forensics and Security.

[48]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[49]  Laurence B. Milstein,et al.  Spoofing or Jamming: Performance Analysis of a Tactical Cognitive Radio Adversary , 2011, IEEE Journal on Selected Areas in Communications.

[50]  Luiz A. DaSilva,et al.  Rendezvous for Cognitive Radios , 2011, IEEE Transactions on Mobile Computing.

[51]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[52]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[53]  Hisato Iwai,et al.  Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.

[54]  J. Wallace,et al.  Physical layer key generation methods for arbitrary fading channels , 2011, 2011 IEEE International Symposium on Antennas and Propagation (APSURSI).

[55]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[56]  Kang G. Shin,et al.  Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.

[57]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[58]  Andrew Thangaraj,et al.  Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes , 2010, IEEE Transactions on Information Forensics and Security.

[59]  Alexandre J. Pierrot,et al.  Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.

[60]  Shamik Sengupta,et al.  Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2011, IEEE Journal on Selected Areas in Communications.

[61]  Shlomo Shamai,et al.  On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels , 2010, IEEE Transactions on Information Forensics and Security.

[62]  Athina P. Petropulu,et al.  Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading , 2011, IEEE Transactions on Information Forensics and Security.

[63]  Yu-Dong Yao,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.

[64]  Suhas N. Diggavi,et al.  Secret-Key Agreement With Channel State Information at the Transmitter , 2010, IEEE Transactions on Information Forensics and Security.

[65]  Ahsan Aziz,et al.  Physical layer authentication using controlled inter symbol interference , 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks.

[66]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[67]  Daesik Hong,et al.  Goodness-of-Fit-Based Malicious User Detection in Cooperative Spectrum Sensing , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[68]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[69]  Xiuzhen Cheng,et al.  Dynamic spectrum access: from cognitive radio to network radio , 2012, IEEE Wireless Communications.

[70]  Il-Min Kim,et al.  Secure communications with untrusted secondary users in cognitive radio networks , 2014, 2012 IEEE Global Communications Conference (GLOBECOM).

[71]  Mansoor Alam,et al.  A robust malicious user detection scheme in cooperative spectrum sensing , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[72]  Zhiqiang Li,et al.  Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks , 2012, IET Commun..

[73]  José Manuel Moya,et al.  Simulation framework for security threats in cognitive radio networks , 2012, IET Commun..

[74]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[75]  Yiwei Thomas Hou,et al.  On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication , 2012, IEEE Wireless Communications Letters.

[76]  Qiang Chen,et al.  An Enhanced D-S Theory Cooperative Spectrum Sensing Algorithm against SSDF Attack , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).

[77]  K. J. Ray Liu,et al.  Indirect Reciprocity Security Game for Large-Scale Wireless Networks , 2012, IEEE Transactions on Information Forensics and Security.

[78]  Shamik Sengupta,et al.  Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach , 2012, IET Commun..

[79]  Shuai Li,et al.  Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.

[80]  Zhu Han,et al.  Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[81]  Lara Dolecek,et al.  Detecting and Counteracting Statistical Attacks in Cooperative Spectrum Sensing , 2012, IEEE Transactions on Signal Processing.

[82]  Jiang Xie,et al.  Finding out the liars: Fighting against false channel information exchange attacks in cognitive radio ad hoc networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[83]  Tongtong Li,et al.  Toward secure cognitive communications in wireless networks , 2012, IEEE Wireless Communications.

[84]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[85]  Santhanakrishnan Anand,et al.  Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks , 2012, IEEE Transactions on Communications.

[86]  Kang G. Shin,et al.  Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[87]  Jim Esch,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proc. IEEE.

[88]  David Starobinski,et al.  Rate adaptation in unlicensed bands under smart jamming attacks , 2012, 2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM).

[89]  Joseph Mitola,et al.  Most Active Band (MAB) Attack and Countermeasures in a Cognitive Radio Network , 2012, IEEE Transactions on Wireless Communications.

[90]  Prasant Mohapatra,et al.  Detecting spectrum misuse in wireless networks , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[91]  Shuai Li,et al.  An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[92]  Prasant Mohapatra,et al.  Trusted collaborative spectrum sensing for mobile cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.

[93]  Suhas N. Diggavi,et al.  Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.

[94]  Lei Yang,et al.  Enforcing dynamic spectrum access with spectrum permits , 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks.

[95]  Wen-Long Chin,et al.  Channel-Based Detection of Primary User Emulation Attacks in Cognitive Radios , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).

[96]  Peng Ning,et al.  A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check , 2013, IEEE Transactions on Wireless Communications.

[97]  Nei Kato,et al.  Intrusion detection system (IDS) for combating attacks against cognitive radio networks , 2013, IEEE Network.

[98]  Chunsheng Xin,et al.  A game-theoretical anti-jamming scheme for cognitive radio networks , 2013, IEEE Network.

[99]  Javier Blesa,et al.  PUE Attack Detection in CWSN Using Collaboration and Learning Behavior , 2013, Int. J. Distributed Sens. Networks.

[100]  Qun Li,et al.  Defending Against Cooperative Attacks in Cooperative Spectrum Sensing , 2013, IEEE Transactions on Wireless Communications.

[101]  Gongjun Yan,et al.  Wireless Network Security: An Overview , 2013 .

[102]  Xiaojiang Du,et al.  Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention , 2013, IEEE Network.

[103]  Do-Hoon Kim,et al.  Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.

[104]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[105]  Loukas Lazos,et al.  Vulnerabilities of cognitive radio MAC protocols and countermeasures , 2013, IEEE Network.

[106]  Hong Wen,et al.  A framework of the PHY-layer approach to defense against security threats in cognitive radio networks , 2013, IEEE Network.

[107]  Bin Liu,et al.  Detection of collaborative SSDF attacks using abnormality detection algorithm in cognitive radio networks , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[108]  Peng Ning,et al.  HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing , 2013, IEEE Journal on Selected Areas in Communications.

[109]  Rahim Tafazolli,et al.  On the Trade-Off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio , 2013, IEEE Communications Letters.

[110]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[111]  Weidong Xiang,et al.  Detecting multi-channel wireless microphone user emulation attacks in white space with noise , 2013 .

[112]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[113]  Qingqi Pei,et al.  A Trust Value-Based Spectrum Allocation Algorithm in CWSNs , 2013, Int. J. Distributed Sens. Networks.

[114]  Andrey Garnaev,et al.  Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments , 2013, 8th International Conference on Cognitive Radio Oriented Wireless Networks.

[115]  Roberto Di Pietro,et al.  Jamming mitigation in cognitive radio networks , 2013, IEEE Network.

[116]  D. Rawat,et al.  Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications , 2013 .

[117]  Mainak Chatterjee,et al.  Utilizing misleading information for cooperative spectrum sensing in cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[118]  Zhu Han,et al.  Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[119]  Kang G. Shin,et al.  Robust Tracking of Small-Scale Mobile Primary User in Cognitive Radio Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[120]  Weidong Xiang,et al.  Detecting multi-channel wireless microphone user emulation attacks in white space with noise , 2013, 8th International Conference on Cognitive Radio Oriented Wireless Networks.

[121]  Wenliang Du,et al.  A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[122]  Young-Hyun Oh,et al.  Sequence sensing Jamming attacks against modular-based channel hopping rendezvous algorithms for cognitive ratio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[123]  Parth H. Pathak,et al.  On insider misbehavior detection in cognitive radio networks , 2013, IEEE Network.

[124]  Qihui Wu,et al.  Stealthy-Attacker Detection With a Multidimensional Feature Vector for Collaborative Spectrum Sensing , 2013, IEEE Transactions on Vehicular Technology.

[125]  Michael A. Temple,et al.  Classifier selection for physical layer security augmentation in Cognitive Radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[126]  Prasant Mohapatra,et al.  Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space , 2013, IEEE Transactions on Mobile Computing.

[127]  Zhu Han,et al.  Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks , 2013, IEEE Transactions on Mobile Computing.

[128]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[129]  Wang Li,et al.  Security-oriented transmission based on cooperative relays in cognitive radio , 2013, China Communications.

[130]  Tharmalingam Ratnarajah,et al.  Enhancing security in the cognitive relay assisted co-existing radio systems with interferences , 2013, 2013 IEEE International Conference on Communications (ICC).

[131]  Tamer Başar,et al.  A game-theoretic view on the physical layer security of cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[132]  Xuemin Shen,et al.  Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.

[133]  Eylem Ekici,et al.  Secrecy in cognitive radio networks: Turning foes to allies , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[134]  Álvaro Araujo,et al.  PUE attack detection in CWSNs using anomaly detection techniques , 2013, EURASIP J. Wirel. Commun. Netw..

[135]  Reihaneh Safavi-Naini,et al.  ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[136]  Rajesh K. Sharma,et al.  Physical Layer Security and Its Applications: A Survey , 2014 .

[137]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[138]  Sheng Zhong,et al.  Towards Cheat-Proof Cooperative Relayfor Cognitive Radio Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[139]  Sheng Zhong,et al.  Towards Cheat-Proof Cooperative Relayfor Cognitive Radio Networks , 2014, IEEE Trans. Parallel Distributed Syst..