Share This Article:

Research and Analysis on Cognitive Radio Network Security

Abstract Full-Text HTML XML Download Download as PDF (Size:411KB) PP. 120-126
DOI: 10.4236/wsn.2012.44017    8,009 Downloads   14,218 Views   Citations
Author(s)    Leave a comment

ABSTRACT

This paper firstly gives a detail analysis on the security problems faced in cognitive radio network, and introduces the basic issues about cognitive radio network. Then, according to the differences between cognitive radio network and existing wireless network, it analyses and discusses the dynamic spectrum access security and artificial intelligence. Finally, it draws a conclusion to security problems of cross layer design.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

L. Tang and J. Wu, "Research and Analysis on Cognitive Radio Network Security," Wireless Sensor Network, Vol. 4 No. 4, 2012, pp. 120-126. doi: 10.4236/wsn.2012.44017.

References

[1] J. Mitola III, “Cognitive Radio for Flexible Mobile Multimedia Communications,” Journal Mobile Networks and Applications, 2001, Vol. 6, No. 5, pp. 435-441. doi:10.1023/A:1011426600077
[2] Q. Zhang, A. B. J. Kokkeler and G. J. M. Smit, “A Re- configurable Radio Architecture for Cognitive Radio in Emergency Networks,” The 9th European Conference on Wireless Technology, Manchester,10-12 September 2006, pp. 35-38. doi:10.1109/ECWT.2006.280428
[3] H. Y. Tang, “Some Physical Layer Issues of Wide-Band Cognitive Radio Systems,” First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, Baltimore, 8-11 November 2005, pp. 151-159. doi:10.1109/DYSPAN.2005.1542630
[4] R. Chen, J. M. Park and J. H. Reed, “Defense against Primary User Emulation Attacks in Cognitive Radio Networks,” IEEE Journal on Selected Areas in Communications, Vol. 26, No. 1, 2008, pp. 25-37. doi:10.1109/JSAC.2008.080104
[5] Y. Zhang, G. C. Xu and X. Z. Geng, “Security Threats in Cognitive Radio Networks,” 10th IEEE International Conference on High Performance Computing and Communications, Dalian, 25-27 September 2008, pp. 1036-1041. doi:10.1109/HPCC.2008.21
[6] X. W. Zhou and X. Y. Xin, “Key Technology Research on Cognitive Radio Security,” Telecommunications Science, Vol. 24, No. 2, 2008.
[7] Q. H. Mahmoud, “Cognitive Networks,” John Wiley & Sons Ltd., Chichester, 2007.
[8] Q. Liu, Z. Zhou, C. Yang and Y. B. Ye, “The Coverage Analysis of Cognitive Radio Network,” 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, 12-14 October 2008, pp. 1-4. doi:10.1109/WiCom.2008.306
[9] K. G. Bian and J. Min, “Security Vulnerabilities in IEEE 802.22,” Proceedings of the 4th Annual International Conference on Wireless Internet, Maui, 17-19 November 2008, pp. 1-9.
[10] R. Kaligineedi, M. Khabbazian and V. K. Bhargava, “Secure Cooperative Sensing Techniques for Cognitive Radio Systems,” IEEE International Conference on Communications, Beijing, 19-23 May 2008, pp. 3406-3410. doi:10.1109/ICC.2008.640
[11] X. Y. Zhang and C. Li, “Constructing Secured Cognitive Wireless Networks: Experiences and Challenges,” Wireless Communications and Mobile Computing, Vol. 10, No. 1, 2010, pp. 50-69.
[12] M. K. Baek and J. Y. Kim, “Effective Signal Detection Using Cooperative Spectrum Sensing in Cognitive Radio Systems,” 11th International Conference on Advanced Communication Technology, Phoenix Park, 15-18 February 2009, pp. 1746-1750.
[13] R. S. Gong, Z. Y. Hu and T. Shen, “Adaptive CRN Spectrum Sensing Scheme with Excellence in Topology and Scan Scheduling,” 3rd International Conference on Sensing Technology, Tainan, 30 November-3 December 2008, pp. 384-391. doi:10.1109/ICSENST.2008.4757133
[14] S. Arkoulis, L. Kazatzopoulos, C. Delakouridis and G. F. Marias, “Cognitive Spectrum and Its Security Issues,” The Second International Conference on Next Generation Mobile Applications, Services and Technologies, 16-19 September 2008, pp. 565-570. doi:10.1109/NGMAST.2008.102
[15] A. O. Richard, K. Kim and A. Ahmad, “On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature,” Proceedings of 18th International Conference on Computer Communications and Networks, San Francisco, 3-6 August 2009, pp. 1-5. doi:10.1109/ICCCN.2009.5235288
[16] W. K. Wang and H. S. Lit, “Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks,” 43rd Annual Conference on Information Sciences and Systems, Baltimore, 18-20 March 2009, pp. 130-134. doi:10.1109/CISS.2009.5054704
[17] K. Takeuchi, S. Kaneko and S. Nomoto, “Radio Environment Prediction for Cognitive Radio,” 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, 15-17 May 2008, pp. 1-6. doi:10.1109/CROWNCOM.2008.4562502
[18] D. Cabric, S. M. Mishra and R. W. Brodersen, “Implementation Issues in Spectrum Sensing for Cognitive Radios,” Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, Asilomar, 7-10 November 2004, pp. 772-776. doi:10.1109/ACSSC.2004.1399240
[19] T. C. Clancy and N. Goergen, “Security in Cognitive Radio Networks: Threats and Mitigation,” 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, 15-17 May 2008, pp. 1- 8. doi:10.1109/CROWNCOM.2008.4562534

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.