Spectrum Sharing Security and Attacks in CRNs: a Review

Abstract

Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.

Authors and Affiliations

Wajdi Alhakami, Ali Mansour, Ghazanfar Safdar

Keywords

Related Articles

Virtual Observation System for Earth System Model: An Application to ACME Land Model Simulations

Investigating and evaluating physical-chemical-biological processes within an Earth system model (EMS) can be very challenging due to the complexity of both model design and software implementation. A virtual observation...

Estimation of Water Quality Parameters Using the Regression Model with Fuzzy K-Means Clustering

The traditional methods in remote sensing used for monitoring and estimating pollutants are generally relied on the spectral response or scattering reflected from water. In this work, a new method has been proposed to fi...

New Data Clustering Algorithm (NDCA)

Wireless sensor networks (WSNs) have sensing, data processing and communicating capabilities. The major task of the sensor node is to gather the data from the sensed field and send it to the end user via the base station...

Security Issues in the Internet of Things (IoT): A Comprehensive Study

Wireless communication networks are highly prone to security threats. The major applications of wireless communication networks are in military, business, healthcare, retail, and transportations. These systems use wired,...

Day-Ahead Load Forecasting using Support Vector Regression Machines

Accurate day-ahead load prediction plays a significant role to electric companies because decisions on power system generations depend on future behavior of loads. This paper presents a strategy for short-term load forec...

Download PDF file
  • EP ID EP88341
  • DOI 10.14569/IJACSA.2014.050111
  • Views 154
  • Downloads 0

How To Cite

Wajdi Alhakami, Ali Mansour, Ghazanfar Safdar (2014). Spectrum Sharing Security and Attacks in CRNs: a Review. International Journal of Advanced Computer Science & Applications, 5(1), 76-87. https://www.europub.co.uk/articles/-A-88341