Open Access   Article Go Back

Analysis of the various Security Attacks and Countermeasures in Cognitive Radio Network

Jagsir Singh1 , Jaswinder Singh2

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-03 , Page no. 61-65, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si3.6165

Online published on Apr 30, 2018

Copyright © Jagsir Singh, Jaswinder Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jagsir Singh, Jaswinder Singh, “Analysis of the various Security Attacks and Countermeasures in Cognitive Radio Network,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.61-65, 2018.

MLA Style Citation: Jagsir Singh, Jaswinder Singh "Analysis of the various Security Attacks and Countermeasures in Cognitive Radio Network." International Journal of Computer Sciences and Engineering 06.03 (2018): 61-65.

APA Style Citation: Jagsir Singh, Jaswinder Singh, (2018). Analysis of the various Security Attacks and Countermeasures in Cognitive Radio Network. International Journal of Computer Sciences and Engineering, 06(03), 61-65.

BibTex Style Citation:
@article{Singh_2018,
author = {Jagsir Singh, Jaswinder Singh},
title = {Analysis of the various Security Attacks and Countermeasures in Cognitive Radio Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {06},
Issue = {03},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {61-65},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=319},
doi = {https://doi.org/10.26438/ijcse/v6i3.6165}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.6165}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=319
TI - Analysis of the various Security Attacks and Countermeasures in Cognitive Radio Network
T2 - International Journal of Computer Sciences and Engineering
AU - Jagsir Singh, Jaswinder Singh
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 61-65
IS - 03
VL - 06
SN - 2347-2693
ER -

           

Abstract

The cognitive radio technology is one of the best candidates to handle the problem of the scarcity of the radio spectrum. The basic principle of cognitive radio is that it allows to secondary users to use the free (idle) primary channels. The cognitive radio networks do not only face the traditional security attacks, but also new security attacks due to the new characteristics of the cognitive radio technology. A number of the major news attacks in the Cognitive Radio Networks (CRNs) are the primary user emulation, spectrum sensing data forgery, and jamming attacks. In wireless networks, security is a challenging aspect. In the CRN, it is much more difficult because Cognitive Radios (CR) performs the various functions such as sensing the radio spectrum, managing the spectrum, spectrum mobility and sharing the spectrum. To perform all these functions efficiently without any attack, security mechanisms are required to implement. In this paper, major security attacks in the cognitive radio networks are discussed. Also, the various countermeasures to these security attacks in CRN are described.

Key-Words / Index Term

Cognitive Radio (CR); Cognitive Radio Networks (CRNs); Primary Users (PUs); Spectrum Sensing Data forgery (SSDF) Secondary Users (SUs).

References

[1] Akyildiz, I.F., Yeol, L.W., Vuran, M.C., Shantidev, M., “Next generation /dynamic spectrum access/cognitive radio wireless networks a survey”, Elsevier Computer Network, vol:50, pp no. 2127-2159, 2006.
[2] Salem, T.M., Abd El-kader S.M., Ramadan, S.M., Abdel-Mageed, M.Z., “Opportunistic Spectrum Access in Cognitive Radio Ad Hoc Networks” IJCSI International Journal of Computer Science Issues, vol. 11(1), pp no-41-50, 2014.
[3] Rawat, D. B., Song,M., Shetty,S., “ Dynamic Spectrum Access for Wireless Networks”. Springer, 2015.
[4] Chen, R., Park, J.M., “Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks”, IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR), Reston, pp no.110-119, 2006.
[5] Alahmadi, A., Abdelhakim, M., Ren, J., Li, T., “Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard,” Information Forensics and Security, IEEE Transactions on, vol: 9(5), pp no. 772-781, 2014.
[6] Haykin, S., "Cognitive radio: Brain-Empowered wireless communication," IEEE journal on selected areas in communication, vol: 25, pp no. 201-220, 2005.
[7] Zou, Y., Wang. X., Shen, Z., “Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks,” IEEE Transactions on Communications, vol:61(12), pp no.5103-5113, 2013.
[8] Tafazzoli, S., Berangi, R., “Cognitive Radio Handover in Cellular Networks”, IJCSI International Journal of Computer Science Issues, vol:11(2),no 1, pp no 1694-0784, 2014.
[9] Mathur, C., Subbalakshmi, K., “Security Issues in Cognitive Radio Networks, Cognitive Networks: Towards Self-Aware Networks”, Wiley, pp no. 284-293, 2007.
[10] Zhihui Shu; Yi Qian; Song Ci, “On physical layer security for cognitive radio networks,” Network, IEEE, vol:27, no.3, pp no.28-33,2013.
[11] Xu, W., Trappe, W., Zhang, Y., Wood, T., “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks”, ACM MobiHoc, pp no.46-57, 2005.
[12] Babu, B.R., Tripathi, M., Gaur,M.S., Gopalani, D., Jat,D.S., “Cognitive Radio Ad-Hoc Networks: Attacks and Its Impact” IEEE conference on Emerging Trends in Networks and Computer Communications (ETNCC), pp no. 125-130,2015.
[13] Zhu, L., Zhou, H., “Two Types of Attacks against Cognitive Radio Network MAC Protocols”, International Conference on Computer Science and Software Engineering, vol:4, pp no.1110-111, 2008,.
[14] Mathur, C.N., Subbalakshmi, K.P.,"Digital signatures for centralized DSA network," in First IEEE workshop on cognitive radio networks, 2007.
[15] Huang, L., Xie, L., Yu, H., Wang, W., Yao, Y. “Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks”, International Conference on Communications and Mobile Computing (CMC), vol: l, no. 2, pp no. 169-17, 2010.
[16] Zhao, C., Wang, W., Huang, L., Yao, Y., “Anti-PUE Attack Base on the Transmitter Fingerprint Identification in Cognitive Radio”, International Conference on Wireless Communications, Networking and Mobile Computing, pp no. 1-5, 2009.
[17] Pandharipande, A., , Kim, J.M., Mazzarese, D., Ji, B., “IEEE P802.22 Wireless RANs: Technology Proposal Package for IEEE 802.22”, IEEE WG on WRANs, 2005.
[18] Chen, R., Park, J.M., Hou, Y.T., Reed, J.H., “Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks”, IEEE Communications Magazine, vol.46, no.4, pp no. 50-55, 2008.
[19] Kaligineedi, P., Khabbazian, M., Bhargava, V.K., “Secure Cooperative Sensing Techniques for Cognitive Radio Systems”, IEEE International Conference on Communications, pp no.3406-3410, 2008.
[20] Wang, W., Li, H., Sun, Y., Han, Z., “Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks”, Conference on Information Sciences and Systems, 2009.
[21] Sodagari, S., Attar, A., Leung, V., Bilen, S., “Denial of service attacks in Cognitive radio networks through channel eviction triggering”, IEEE Global Telecommunication, pp no. 610, 2010.
[22] Karlof, C., Wagner, D., “Secure Routing in Wireless Networks: Attacks and Countermeasures”, Ad Hoc Networks, vol:1, pp no.293-315, 2009.