

A Survey: Security Threats/Attacks in Cognitive Radio Network
Abstract
Keywords
References
. Spectrum Efficiency Working Group, Spectrum policy task force report, Federal Communications Commission. http://www.fcc.gov/sptf/files/SEWGFinalReport_1.pdf. 2002.
. I.F. Akyildiz et al., NeXt Generation/Dynamic Spectrum Ac- cess/Cognitive Radio Wireless Networks: A Survey, Elsevier Jl. on Comp. Networks, vol-50, pp. 2127-2159, Sept. 2006.
. S. Haykin "Cognitive radio: Brain-empowered wireless communications", IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005.
. J. Mitola and G.Q. Maguire, "Cognitive radio: Marking software radios more personal, IEEE Personal Communications", vol. 6, no. 4, pp. 12-18, Aug. 1999.
. Yucek, T., Arslan, H., "A survey of spectrum sensing algorithms for cognitive radio applications", IEEE Communications Surveys & Tutorials, vol.11, no.1, pp.116-130, First Quarter 2009.
. A. Ghasemi, E. Sousa, "Collaborative spectrum sensing for tunistic access in fading environments", ln: Proc. Of IEEE DySPAN, pp. 131-136, 2005.
. E. Visotsky, S. Kuffner, R. Peterson, on "collaborative detection of tv transmissions in support of dynamic spectrum sharing", in: Proc. of IEEE DySPAN, pp. 338-345, 2005.
. J. Unnikrishnan, V.V. Veeravalli, "Cooperative sensing for primary detection in cognitive radio", IEEE Journal vol. 2, pp. 18-27, 2008.
. Z. Li, F. Yu, M. Huang, "A cooperative spectrum sensing Consensus scheme in cognitive radios", in: Proc. of IEEE Infocom, pp. 2546-2550, 2009.
. G. Ganesan, Y.G. Li, "Cooperative spectrum sensing in Cognitive radio- part I: two user networks", IEEE Transactions on Wireless Communications, pp. 2204-2213, 2007.
. G. Ganesan, Y.G. Li, "Cooperative spectrum sensing in cognitive radio-part II: multiuser networks", IEEE Transactions on Wireless Communications, pp. 2204-2213, 2007.
. W. Zhang, K. Letaief, "Cooperative spectrum sensing with transmit and relay diversity in cognitive radio networks", IEEE Transactions on Wireless Communications, pp. 4761-4766, 2008.
. Yuan Zhang, Gaochao Xu, Xiaozhong Geng, "Security Threats in Cognitive Radio Networks", proceeding of 10th IEEE International Conference on High Performance Computing and Communications, Changchun, China, pp. 1036-1041, Sept. 2008.
. Xueying Zhang, Cheng Li, "The Security in Cognitive Radio Networks: A Survey", proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pp. 309-313, June 2009.
. T. Charles Clancy, Nathan Goergen, "security in Cognitive Radio Networks: Threats and Mitigation", proceeding of 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, pp. 1-8, May 2008.
. Sugata Sanyal , Rohit Bhadauria and Chittabrata Ghosh, "Secure Communication in Cognitive Radio Networks", proceeding of International Conference on Computers and Devices for Communication, Mumbai India, pp. 1-4, Dec. 2009.
. Deepa Das and Sushmita Das, "Primary User Emulation Attack in Cognitive Radio Networks: A Survey", IRACST-International Journal of Computer Networks and Wireless Communications, pp. 312-318, 2013.
. Z. Jin, S. Anand, and K.P. Subbalakshmi, "Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks”, Proc. IEEE Int’l Conf. Comm. (ICC'09), June 2009.
. Y.Tan, S.Sengupta, and K.P.Subbalakshmi, "Primary User Emulation Attack in dynamic spectrum access networks: A game theoretic approach", Communications, IET, pp. 964-973, 2012.
. T. Charles Clancy and Nathan Goergen,"Security in Cognitive Radio Networks: Threats and Mitigation", International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), Singapore, pp.18, May 2008.
. Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza- Raez, "Modeling primary user emulation attacks and defenses in cognitive radio networks", in Proc. of IPCCC, pp. 208-˙ 215. 2009.
. Yuan Zhang, Gaochao Xu, Xiaozhong Geng, "Security Threats in Cognitive Radio Networks", proceeding of 10th IEEE International Conference on High Performance Computing and Communications, Changchun, China, pp. 1036-1041, Sept. 2008.
. T. Charles Clancy, Nathan Goergen, "Security in Cognitive Radio Networks: Threats and Mitigation", proceeding of 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, pp. 1-8, May 2008.
. Xueying Zhang, Cheng Li, "The Security in Cognitive Radio Networks: A Survey", proceedings of the International Conference on Wireless Communications and Mobile Computing, Leipzig, Germany, pp. 309-313, June 2009.
. A.C. Toleda and X. Wang, "Robust detection of Selfish miss-behavior in Wireless networks", IEEE Journal on Selected Areas in Communication, vol. 25, pp. 1124-1134, Aug. 2007.
. Y. Liang, H.V. Poor and S. Shamai (Shitz). Foundations and Trends in Communications and Information Theory. Information Theoretic Security, pp. 355-580, 2008.
. W. El-Hajj, H. Safa, M. Guizani, "Survey of Security Issues in Cognitive Radio Network", Journal of Internet Technology vol. 12, no.2, 2011.
. S. Sodagari and T. C. Clancy, "An anti-jamming strategy for channel access in cognitive radio networks", In Decision and Game Theory for Security, Springer, pp. 34-43, 2011.
. A. Rawat, P. Anand, H. Chen, and P. Varshney. "Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks", Signal Processing, IEEE Transactions on, pp. 774-786, 2011.
. K. Pelechrinis, M. Iliofotou and S.V. Krishnamurthy, "Denial of Service Attacks in Wireless Networks": The Case of Jammer, In IEEE Communication Surveys and Tutorials, vol.13, pp. 245-257, April 2011.
. L. Akter and B. Natarajan, "Distributed Approach for Power and Rate Allocation to secondary users in Cognitive Radio Networks", IEEE Trans. Vehicular Technology, vol. 60, no. 4, pp. 1526- 1538, May 2011.
. N. Chetan Mathur and K.P. Subbalakshmi, "Security Issues in Cognitive Radio Networks", Stevens Institute of Technology, NJ, USA, 2007.
. Y. Tan, K. Hong, Sh. S., and KP. Subbalakshmi, "Using Sybil identities for primary user emulation and byzantine attacks indsa networks", In Global Telecommunications Conference (GLOBECOM2011), pp. 1-5, 2011.
. J. Hernandez-Serrano, O. LeA¸sn and M. Soriano, "Modeling the Lion Attack in Cognitive Radio Networks", EURASIP Journal on Wireless Communications and Networking, Article ID 242304, vol. 2011, pp. 1-10, 2011.
. Fadlullah, Z.M.; Nishiyama, H.; Kato, N.; Fouda, M.M., "Intrusion detection system (IDS) for combating attacks against cognitive radio networks", Network, IEEE, vol.27, no.3, pp.51-56, May-June 2013.
. Butun, I.; Morgera, S.D.; Sankar, R., "A Survey of Intrusion Detection Systems in Wireless Sensor Networks", Communications Surveys Tutorials, IEEE, vol.16, no.1, pp.266-282, First Quarter 2014.
. Ruiliang Chen, Jung-Min Park, and Jeffrey H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks", IEEE Journal on Selected Areas in Communications, vol. 26, Issue I, pp. 25-37, Jan. 2008.
. W. Xu, T. Wood, and W. Trappe, et al., "Channel surfng and spatial retreats: Defenses against wireless denial of service", in Proc. 3rd ACM Workshop on Wireless Security, Philadelphia, PA, pp. 80-89, Jan. 2004.
. A. Attar, H. Tang, A. V. Vasilakos, et al., "A survey of security challenges in cognitive radio networks: Solutions and future research directions", Proceedings of the IEEE, vol. 100, no. 12, pp. 3172- 3186, 2012.
. S. Liu, L. Lazos, and M. Krunz, "Thwarting inside jamming attacks on wireless broadcast communications," in Proc. Fourth ACM Conference on Wireless Network Security. ACM, pp. 29-40, 2011.
. W.Wang, S. Bhattacharjee, M. Chatterjee, et al., "Collaborative jamming and collaborative defense in cognitive radio networks," Pervasive and Mobile Computing, vol. 4, pp. 572-587, 2013.
. M. Camilo, et al. "Anti-jamming defense mechanism in cognitive radios networks", in Proc. Military Communications Conference, pp. 1-6, 2012.
. R. Di Pietro and G. Oligeri, "Jamming mitigation in cognitive radio networks", Network, IEEE, vol. 3, 2013.
. L. Zhang, Q. Pei, and H. Li, "Anti-jamming scheme based on zero pre-shared secret in cognitive radio network", in Proc. Eighth International Conference on Computational Intelligence and Security, IEEE, pp. 670-673, 2012.
. O. Leon, J. Hernandez-Serrano and M.Soriano, Securing Cognitive Radio Networks, International Journal of Commu- nication Systems. vol.23, pp.116-130.
. Q. Pei, H. Li, J. Ma, et al., "Defense against objective function attacks in cognitive radio networks", Chinese Journal of Electronics, vol. 1, pp. 138-142, 2011.
. A. Rawat, P. Anand, H. Chen, and P. Varshney, "Countering byzantine attacks in cognitive radio networks", in proc. ICASSP, 2010.
. C. Karlof and D. Wagner, "Securing Routing in Wireless Sensor Networks: Attacks and Countermeasures", in Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Berkeley, CA, pp. 113-127, May 2003.
. J. Hernandez-Serrano, O. Leon and M. Soriano, "Modeling the Lion Attack in Cognitive Radio Networks, Journal on Wireless Communications and Networking”, pp. 1-10, 2011.
. D. Lingjie, A. W. Min, J. Huang, K. G. Shin, "Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks", IEEE JSAC, vol.30, no.9, pp. 1658-1665, Oct. 2012.
. S. Huang, X. Liu, and Z. Ding, "Optimal sensing-transmission structure for dynamic spectrum access", in Proc. IEEE INFOCOM, 2009.
. C. Courcoubetis and R. Weber, Pricing Communication Networks: Economics, Technology and Modelling. Wiley, 2003.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.