Spectrum Sharing Security and Attacks in CRNs: a Review
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 1
Abstract
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.
Authors and Affiliations
Wajdi Alhakami, Ali Mansour, Ghazanfar Safdar
SVM Optimization for Sentiment Analysis
Exponential growth in mobile technology and mini computing devices has led to a massive increment in social media users, who are continuously posting their views and comments about certain products and services, which ar...
Preference in using Agile Development with Larger Team Size
Agile software development includes a group of software development methodologies based on iterative development, where requirements and solutions evolve through collaboration between cross-functional self-organizing tea...
[url=http://thesai.org/Downloads/Volume2No5/Paper%2015-Application%20of%20Fuzzy%20Logic%20Approach%20to%20Software%20Effort%20Estimation.pdf] Application of Fuzzy Logic Approach to Software Effort Estimation[/url]
The most significant activity in software project management is Software development effort prediction. The literature shows several algorithmic cost estimation models such as Boehm’s COCOMO, Albrecht's' Func...
Face Recognition as an Authentication Technique in Electronic Voting
In this research a Face Detection and Recognition system (FDR) used as an Authentication technique in online voting, which one of electronic is voting types, is proposed. Web based voting allows the voter to vote from an...
Insulator Detection and Defect Classification using Rotation Invariant Local Directional Pattern
Detecting power line insulator automatically and analyzing their defects are vital processes in maintaining power distribution systems. In this work, a rotation invariant texture pattern named rotation invariant local di...