Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey: Security Threats/Attacks in Cognitive Radio Network

Hadeer Alaa, Waleed Saad, Mona Shokair, Said El-Halfawy

Abstract


The growth in wireless communication is accompanied with an increase in demand for the radio spectrum that cannot be expanded. Most of the radio spectrum has been allocated, so it becomes extremely difficult to for new services to find vacant bands. Recent studies show that static spectrum allocation policy caused poor spectrum utilization. Cognitive Radio (CR) technology had been proposed to solve the problem of spectrum scarcity and inefficient spectrum utilization. In CR technology, unlicensed secondary users can utilize the licensed frequency band when it is vacant of the primary users (PUs). Initially research in cognitive radio focused in resource allocation, spectrum sensing and management. Parallelly, the security is another important issue that attracts the attention of researchers. Due to the characteristics of cognitive radio, it is vulnerable to a class of security threats and attacks. These attacks and threats are considered as challenges in deployment of cognitive radio network (CRN) and achieving Quality of Service (QOS). This paper is a survey that discussed some of the security threats and attacks in CRN and spectrum sensing. Attacks in different layers will be explained.

Keywords


Cognitive Radio, Detection and Mitigation, Security Threats/Attacks, Spectrum Sensing.

Full Text:

PDF

References


. Spectrum Efficiency Working Group, Spectrum policy task force report, Federal Communications Commission. http://www.fcc.gov/sptf/files/SEWGFinalReport_1.pdf. 2002.

. I.F. Akyildiz et al., NeXt Generation/Dynamic Spectrum Ac- cess/Cognitive Radio Wireless Networks: A Survey, Elsevier Jl. on Comp. Networks, vol-50, pp. 2127-2159, Sept. 2006.

. S. Haykin "Cognitive radio: Brain-empowered wireless communications", IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005.

. J. Mitola and G.Q. Maguire, "Cognitive radio: Marking software radios more personal, IEEE Personal Communications", vol. 6, no. 4, pp. 12-18, Aug. 1999.

. Yucek, T., Arslan, H., "A survey of spectrum sensing algorithms for cognitive radio applications", IEEE Communications Surveys & Tutorials, vol.11, no.1, pp.116-130, First Quarter 2009.

. A. Ghasemi, E. Sousa, "Collaborative spectrum sensing for tunistic access in fading environments", ln: Proc. Of IEEE DySPAN, pp. 131-136, 2005.

. E. Visotsky, S. Kuffner, R. Peterson, on "collaborative detection of tv transmissions in support of dynamic spectrum sharing", in: Proc. of IEEE DySPAN, pp. 338-345, 2005.

. J. Unnikrishnan, V.V. Veeravalli, "Cooperative sensing for primary detection in cognitive radio", IEEE Journal vol. 2, pp. 18-27, 2008.

. Z. Li, F. Yu, M. Huang, "A cooperative spectrum sensing Consensus scheme in cognitive radios", in: Proc. of IEEE Infocom, pp. 2546-2550, 2009.

. G. Ganesan, Y.G. Li, "Cooperative spectrum sensing in Cognitive radio- part I: two user networks", IEEE Transactions on Wireless Communications, pp. 2204-2213, 2007.

. G. Ganesan, Y.G. Li, "Cooperative spectrum sensing in cognitive radio-part II: multiuser networks", IEEE Transactions on Wireless Communications, pp. 2204-2213, 2007.

. W. Zhang, K. Letaief, "Cooperative spectrum sensing with transmit and relay diversity in cognitive radio networks", IEEE Transactions on Wireless Communications, pp. 4761-4766, 2008.

. Yuan Zhang, Gaochao Xu, Xiaozhong Geng, "Security Threats in Cognitive Radio Networks", proceeding of 10th IEEE International Conference on High Performance Computing and Communications, Changchun, China, pp. 1036-1041, Sept. 2008.

. Xueying Zhang, Cheng Li, "The Security in Cognitive Radio Networks: A Survey", proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pp. 309-313, June 2009.

. T. Charles Clancy, Nathan Goergen, "security in Cognitive Radio Networks: Threats and Mitigation", proceeding of 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, pp. 1-8, May 2008.

. Sugata Sanyal , Rohit Bhadauria and Chittabrata Ghosh, "Secure Communication in Cognitive Radio Networks", proceeding of International Conference on Computers and Devices for Communication, Mumbai India, pp. 1-4, Dec. 2009.

. Deepa Das and Sushmita Das, "Primary User Emulation Attack in Cognitive Radio Networks: A Survey", IRACST-International Journal of Computer Networks and Wireless Communications, pp. 312-318, 2013.

. Z. Jin, S. Anand, and K.P. Subbalakshmi, "Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks”, Proc. IEEE Int’l Conf. Comm. (ICC'09), June 2009.

. Y.Tan, S.Sengupta, and K.P.Subbalakshmi, "Primary User Emulation Attack in dynamic spectrum access networks: A game theoretic approach", Communications, IET, pp. 964-973, 2012.

. T. Charles Clancy and Nathan Goergen,"Security in Cognitive Radio Networks: Threats and Mitigation", International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), Singapore, pp.18, May 2008.

. Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza- Raez, "Modeling primary user emulation attacks and defenses in cognitive radio networks", in Proc. of IPCCC, pp. 208-˙ 215. 2009.

. Yuan Zhang, Gaochao Xu, Xiaozhong Geng, "Security Threats in Cognitive Radio Networks", proceeding of 10th IEEE International Conference on High Performance Computing and Communications, Changchun, China, pp. 1036-1041, Sept. 2008.

. T. Charles Clancy, Nathan Goergen, "Security in Cognitive Radio Networks: Threats and Mitigation", proceeding of 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, pp. 1-8, May 2008.

. Xueying Zhang, Cheng Li, "The Security in Cognitive Radio Networks: A Survey", proceedings of the International Conference on Wireless Communications and Mobile Computing, Leipzig, Germany, pp. 309-313, June 2009.

. A.C. Toleda and X. Wang, "Robust detection of Selfish miss-behavior in Wireless networks", IEEE Journal on Selected Areas in Communication, vol. 25, pp. 1124-1134, Aug. 2007.

. Y. Liang, H.V. Poor and S. Shamai (Shitz). Foundations and Trends in Communications and Information Theory. Information Theoretic Security, pp. 355-580, 2008.

. W. El-Hajj, H. Safa, M. Guizani, "Survey of Security Issues in Cognitive Radio Network", Journal of Internet Technology vol. 12, no.2, 2011.

. S. Sodagari and T. C. Clancy, "An anti-jamming strategy for channel access in cognitive radio networks", In Decision and Game Theory for Security, Springer, pp. 34-43, 2011.

. A. Rawat, P. Anand, H. Chen, and P. Varshney. "Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks", Signal Processing, IEEE Transactions on, pp. 774-786, 2011.

. K. Pelechrinis, M. Iliofotou and S.V. Krishnamurthy, "Denial of Service Attacks in Wireless Networks": The Case of Jammer, In IEEE Communication Surveys and Tutorials, vol.13, pp. 245-257, April 2011.

. L. Akter and B. Natarajan, "Distributed Approach for Power and Rate Allocation to secondary users in Cognitive Radio Networks", IEEE Trans. Vehicular Technology, vol. 60, no. 4, pp. 1526- 1538, May 2011.

. N. Chetan Mathur and K.P. Subbalakshmi, "Security Issues in Cognitive Radio Networks", Stevens Institute of Technology, NJ, USA, 2007.

. Y. Tan, K. Hong, Sh. S., and KP. Subbalakshmi, "Using Sybil identities for primary user emulation and byzantine attacks indsa networks", In Global Telecommunications Conference (GLOBECOM2011), pp. 1-5, 2011.

. J. Hernandez-Serrano, O. LeA¸sn and M. Soriano, "Modeling the Lion Attack in Cognitive Radio Networks", EURASIP Journal on Wireless Communications and Networking, Article ID 242304, vol. 2011, pp. 1-10, 2011.

. Fadlullah, Z.M.; Nishiyama, H.; Kato, N.; Fouda, M.M., "Intrusion detection system (IDS) for combating attacks against cognitive radio networks", Network, IEEE, vol.27, no.3, pp.51-56, May-June 2013.

. Butun, I.; Morgera, S.D.; Sankar, R., "A Survey of Intrusion Detection Systems in Wireless Sensor Networks", Communications Surveys Tutorials, IEEE, vol.16, no.1, pp.266-282, First Quarter 2014.

. Ruiliang Chen, Jung-Min Park, and Jeffrey H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks", IEEE Journal on Selected Areas in Communications, vol. 26, Issue I, pp. 25-37, Jan. 2008.

. W. Xu, T. Wood, and W. Trappe, et al., "Channel surfng and spatial retreats: Defenses against wireless denial of service", in Proc. 3rd ACM Workshop on Wireless Security, Philadelphia, PA, pp. 80-89, Jan. 2004.

. A. Attar, H. Tang, A. V. Vasilakos, et al., "A survey of security challenges in cognitive radio networks: Solutions and future research directions", Proceedings of the IEEE, vol. 100, no. 12, pp. 3172- 3186, 2012.

. S. Liu, L. Lazos, and M. Krunz, "Thwarting inside jamming attacks on wireless broadcast communications," in Proc. Fourth ACM Conference on Wireless Network Security. ACM, pp. 29-40, 2011.

. W.Wang, S. Bhattacharjee, M. Chatterjee, et al., "Collaborative jamming and collaborative defense in cognitive radio networks," Pervasive and Mobile Computing, vol. 4, pp. 572-587, 2013.

. M. Camilo, et al. "Anti-jamming defense mechanism in cognitive radios networks", in Proc. Military Communications Conference, pp. 1-6, 2012.

. R. Di Pietro and G. Oligeri, "Jamming mitigation in cognitive radio networks", Network, IEEE, vol. 3, 2013.

. L. Zhang, Q. Pei, and H. Li, "Anti-jamming scheme based on zero pre-shared secret in cognitive radio network", in Proc. Eighth International Conference on Computational Intelligence and Security, IEEE, pp. 670-673, 2012.

. O. Leon, J. Hernandez-Serrano and M.Soriano, Securing Cognitive Radio Networks, International Journal of Commu- nication Systems. vol.23, pp.116-130.

. Q. Pei, H. Li, J. Ma, et al., "Defense against objective function attacks in cognitive radio networks", Chinese Journal of Electronics, vol. 1, pp. 138-142, 2011.

. A. Rawat, P. Anand, H. Chen, and P. Varshney, "Countering byzantine attacks in cognitive radio networks", in proc. ICASSP, 2010.

. C. Karlof and D. Wagner, "Securing Routing in Wireless Sensor Networks: Attacks and Countermeasures", in Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Berkeley, CA, pp. 113-127, May 2003.

. J. Hernandez-Serrano, O. Leon and M. Soriano, "Modeling the Lion Attack in Cognitive Radio Networks, Journal on Wireless Communications and Networking”, pp. 1-10, 2011.

. D. Lingjie, A. W. Min, J. Huang, K. G. Shin, "Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks", IEEE JSAC, vol.30, no.9, pp. 1658-1665, Oct. 2012.

. S. Huang, X. Liu, and Z. Ding, "Optimal sensing-transmission structure for dynamic spectrum access", in Proc. IEEE INFOCOM, 2009.

. C. Courcoubetis and R. Weber, Pricing Communication Networks: Economics, Technology and Modelling. Wiley, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.