Spectrum Sharing Security and Attacks in CRNs: a Review

Abstract

Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.

Authors and Affiliations

Wajdi Alhakami, Ali Mansour, Ghazanfar Safdar

Keywords

Related Articles

 Representation of a Sentence using a Polar Fuzzy Neutrosophic Semantic Net

 A semantic net can be used to represent a sentence. A sentence in a language contains semantics which are polar in nature, that is, semantics which are positive, neutral and negative. Neutrosophy is a relatively ne...

Secure Data Accumulation among Reliable Hops with Rest/Alert Scheduling in Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are more inclined to attackers by outer sources. The total information must be secured to guarantee the uprightness and privacy. In sensor networks, the data collection and data accumulati...

Sensitivity Analysis of Fourier Transformation Spectrometer: FTS Against Observation Noise on Retrievals of Carbon Dioxide and Methane

Sensitivity analysis of Fourier Transformation Spectrometer: FTS against observation noise on retrievals of carbon dioxide and methane is conducted. Through experiments with real observed data and additive noise, it is f...

AN OPEN CLOUD MODEL FOR EXPANDING HEALTHCARE INFRASTRUCTURE

With the rapid improvement of computation facilities, healthcare still suffers limited storage space and lacks full utilization of computer infrastructure. That not only adds to the cost burden but also limits the possib...

High Performance Speed Sensorless Control of Three-Phase Induction Motor Based on Cloud Computing

Induction motor is a cast of alternating current motor where charge endures allotted to the rotor close-at-hand deputation of conductive charge. These motors are broadly applied in industrial claim due to they are arduou...

Download PDF file
  • EP ID EP88341
  • DOI 10.14569/IJACSA.2014.050111
  • Views 131
  • Downloads 0

How To Cite

Wajdi Alhakami, Ali Mansour, Ghazanfar Safdar (2014). Spectrum Sharing Security and Attacks in CRNs: a Review. International Journal of Advanced Computer Science & Applications, 5(1), 76-87. https://europub.co.uk/articles/-A-88341