Author:
Pratibha ,Thangjam Sharmelee,Kumar Naresh,Kumar Sanjiv
Abstract
Abstract
Today is the era of intelligent cognitive radio network technology that allows the utilization of available spectrum efficiently by allocation of the spectrum dynamically to unlicensed users. The technology utilizes the free spectrum bands which are not being used by the authorized users without causing any obstruction to the existing transmission. Cognitive radio technology promises interference free spectrum access by users. However, there exist many security attacks on spectrum impacting on spectrum access probability and network services. This will result in significant degradation of the performance of a cognitive radio network. This paper discusses the several attacks on different layers, their motives and various mechanisms to prevent them. The specific threats based on issues with configurability are explored on the basis of the related work. In this paper the role of authentication mechanism to prevent the attacks for hassle free spectrum utilization and its performance in resolving the cognitive network security issues are discussed. The need for effective sensing and decision mechanisms to enhance the security of cognitive networks is demonstrated in the paper. Hence, the presented paper gives an overview of existing research efforts at first and secondly, the research challenges are identified that can address the ways to secure the cognitive radio network and lastly the countermeasures in cognitive radio network security strategies are demonstrated.
Reference27 articles.
1. Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey;Salahdine;Phys. Commun.,2020
2. Geo-location database techniques for incumbent protection in the TV white space;Gurney,2008
3. Data fusion based on node trust evaluation in wireless sensor networks;Jianming;J. Sensors,2014
4. Defending against massive SSDF attacks from a novel perspective of Honest Secondary Users;Sun,2019
5. Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks, no. March;Feng,2015
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A survey on cognitive radio network attack mitigation using machine learning and blockchain;EURASIP Journal on Wireless Communications and Networking;2023-09-30
2. An Overview of Security Issues in Cognitive Radio Ad Hoc Networks;Advances in Systems Analysis, Software Engineering, and High Performance Computing;2023-06-30
3. A comprehensive survey on heterogeneous cognitive radio networks;Comprehensive Guide to Heterogeneous Networks;2023