Countermeasures to security threats/attacks on different protocol layers in cognitive radio networks: An overview

Author(s):  
Shekhar Raj ◽  
O. P. Sahu
2012 ◽  
Vol 6 (8) ◽  
pp. 984 ◽  
Author(s):  
E. Romero ◽  
A. Mouradian ◽  
J. Blesa ◽  
J.M. Moya ◽  
A. Araujo

2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Hui Lin ◽  
Jia Hu ◽  
Chuan Huang ◽  
Li Xu ◽  
Bin Wu

Cognitive radio networks (CRNs) are an emerging wireless communications technique for resolving the significant spectrum scarcity problem. Despite their promising characteristics, CRNs also introduce new security threats, especially the internal attacks during the spectrum sensing and allocation process, which can degrade the efficiency of spectrum sensing and allocation. To address this issue, this paper proposes a distributed secure cooperative spectrum sensing strategy (DSCS) based on a dynamic reputation model to defend against attacks and provide reliable spectrum sensing. Moreover, the reputation values are used as weights in a novel distributed cheat-proof spectrum allocation strategy (DCSA) based on the Vickrey-Clarke-Groves (VCG) mechanism. Both theoretical analysis and simulation results indicate that the proposed DSCS and DCSA strategies can provide an effective countermeasure against the internal spectrum sensing data falsification (SSDF) attacks through enabling secondary users to obtain more accurate cooperative sensing results in adversarial environments.


Author(s):  
Maria Saher ◽  
Asjad Amin ◽  
Imran Ali Qureshi ◽  
Muhammad Ali Qureshi ◽  
Muhammad Moazzam Jawaid

During the last decade, the CR (Cognitive Radio) came into view as a major wireless technology to resolve the issue of spectrum secrecy and efficient spectrum utilization. However, due to unlicensed (secondary) users, there are various security threats to the CRN (Cognitive Radio Networks). Some malicious users may access the CRN and mislead the secondary users to vacate the occupied channel, which may stop the communication. In this work, we propose a new cryptographic-based algorithm, CRAES (Cognitive Radio-Advanced Encryption Standard), inspired by the traditional AES to secure the CRN. The data of the primary and secondary users is encrypted at the transmitter and decrypted at the receiver. Unlike the conventional AES, we introduce the data-dependent key-generation and shift-rows process. We also reduce the rounds of AES from 10-6 to improve the computational efficiency without compromising the overall security. The experimental results demonstrate the effectiveness of the proposed CR-AES in terms of better security, reliability, and computational efficiency.


IEEE Network ◽  
2013 ◽  
Vol 27 (3) ◽  
pp. 34-39 ◽  
Author(s):  
Hong Wen ◽  
Shaoqian Li ◽  
Xiping Zhu ◽  
Liang Zhou

Sign in / Sign up

Export Citation Format

Share Document