Skip to main content

Security Issues in Cognitive Radio Ad Hoc Networks

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

The cognitive radio network (CRN) is an interesting variant of opportunistic networks. It is gaining steep popularity due to its peculiar capability in mitigating spectrum scarcity problem. Due to the same reason it has different security challenges than other wireless and opportunistic networks, in particular. The chapter accounts security-related research issues, domains of study, security implications and various approaches proposed in the literature to handle them. In the interest of space, the illustration provides crisp summary of the topic instead of exhaustive presentation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks, 50(13), 2127–2159.

    Article  Google Scholar 

  2. Granelli, F., Pawelczak, P., Prasad, R. V., Subbalakshmi, K. P., Chandramouli, R., Hoffmeyer, J. A., & Berger, H. S. (2010). Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities. IEEE Communications Magazine, 48(1), 71.

    Article  Google Scholar 

  3. Orumwense, E. F., Oyerinde, O., & Mneney, S. H. (2017). Improved cooperative spectrum sensing under primary user emulation attacks in cognitive radio networks. Journal of Engineering Research, 5(3), 1–18.

    Google Scholar 

  4. Akyildiz, I. F., Lee, W. Y., & Chowdhury, K. R. (2009). CRAHNs: Cognitive radio ad hoc networks. Ad Hoc Networks, 7(5), 810–836.

    Article  Google Scholar 

  5. Mansoor, N., Islam, A. M., Zareei, M., Baharun, S., Wakabayashi, T., & Komaki, S. (2015). Cognitive radio ad-hoc network architectures: A survey. Wireless Personal Communications, 81(3), 1117–1142.

    Article  Google Scholar 

  6. Gupta, B. B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global. https://doi.org/10.4018/978-1-5225-0105-3.

    Book  Google Scholar 

  7. Ko, H., Mesicek, L., Choi, J., Choi, J., & Hwang, S. (2018). A study on secure contents strategies for applications with DRM on cloud computing. International Journal of Cloud Applications and Computing (IJCAC), 8(1), 143–153. https://doi.org/10.4018/IJCAC.2018010107.

    Article  Google Scholar 

  8. Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE IoT Journal, 6, 1402. https://doi.org/10.1109/JIOT.2018.2844727.

    Article  Google Scholar 

  9. Gupta, B. B., Agrawal, D. P., & Wang, H. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (p. 666). Boca Raton, FL: CRC Press, Taylor & Francis.

    Google Scholar 

  10. Fragkiadakis, A. G., Tragos, E. Z., & Askoxylakis, I. G. (2013). A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys and Tutorials, 15(1), 428–445.

    Article  Google Scholar 

  11. Holcomb, S., & Rawat, D. B. (2016, March). Recent security issues on cognitive radio networks: A survey. In SoutheastCon (pp. 1–6). Piscataway, NJ: IEEE.

    Google Scholar 

  12. Salameh, H. B., Almajali, S., Ayyash, M., & Elgala, H. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5, 1904.

    Article  Google Scholar 

  13. Yucek, T., & Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Communications Surveys and Tutorials, 11(1), 116–130.

    Article  Google Scholar 

  14. Jo, M., Han, L., Kim, D., & In, H. P. (2013). Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Network, 27(3), 46–50.

    Article  Google Scholar 

  15. Baldini, G., Sturman, T., Biswas, A. R., Leschhorn, R., Godor, G., & Street, M. (2012). Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead. IEEE Communications Surveys and Tutorials, 14(2), 355–379.

    Article  Google Scholar 

  16. Nagpal, C. K. (2018). A game theory based solution for security challenges in CRNs. 3D Research, 9(1), 11.

    Article  MathSciNet  Google Scholar 

  17. Meghanathan, N., & Reddy, Y. B. (2013). Cognitive radio technology applications for wireless and mobile ad hoc networks. IGI Global book series in AWTT. https://doi.org/10.4018/978-1-4666-4221-8.

  18. Agarwal, S., Shakya, R. K., Singh, Y. N., & Roy, A. (2012). DSAT-MAC: Dynamic slot allocation based TDMA MAC protocol for cognitive radio networks. In International Conference on Wireless and Optical Communications Networks (WOCN) (pp. 1–6).

    Google Scholar 

  19. Khasawneh, M., & Agarwal, A. (2017). A collaborative approach for monitoring nodes behavior during spectrum sensing to mitigate multiple attacks in cognitive radio networks. Security and Communication Networks, 2017, 1.

    Article  Google Scholar 

  20. Mathur, C. N., & Subbalakshmi, K. P. (2007). Security issues in cognitive radio networks. In Cognitive networks: Towards self-aware networks (pp. 284–293). Hoboken, NJ: Wiley.

    Google Scholar 

  21. Akram, M. W., Salman, M., Shah, M. A., & Ahmed, M. M. (2017, September). A review: Security challenges in cognitive radio networks. In Automation and computing (ICAC) (pp. 1–6). Piscataway, NJ: IEEE.

    Google Scholar 

  22. Ren, K., Zhu, H., Han, Z., & Poovendran, R. (2013). Security in cognitive radio networks. Proceedings of IEEE Network, 27, 2–3.

    Article  Google Scholar 

  23. Kang, T., & Guo, L. (2015). Physical layer security in cognitive radio based self-organization network. Mobile Networks and Applications, 20(4), 459–465.

    Article  Google Scholar 

  24. Bouabdellah, M., Kaabouch, N., El Bouanani, F., & Ben-Azza, H. (2018). Network layer attacks and countermeasures in cognitive radio networks: A survey. Journal of Information Security and Applications, 38, 40–49.

    Article  Google Scholar 

  25. Babu, B. R., Tripathi, M., Gaur, M. S., Gopalani, D., & Jat, D. S. (2015, May). Cognitive radio ad-hoc networks: Attacks and its impact. In Emerging Trends in Networks and Computer Communications (ETNCC) (pp. 125–130). IEEE.

    Google Scholar 

  26. Hossain, A., & Sarkar, N. I. (2015, November). Cross layer rendezvous in cognitive radio ad-hoc networks. In Telecommunication Networks and Applications Conference (ITNAC) (pp. 149–154). IEEE.

    Google Scholar 

  27. Soliman, J. N., Mageed, T. A., & El-Hennawy, H. M. (2017, December). Taxonomy of security attacks and threats in cognitive radio networks. In Electronics, Communications and Computers (JAC-ECC), 2017 Japan-Africa Conference on IEEE (pp. 127–131).

    Google Scholar 

  28. Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  29. Kim, H. (2013). Privacy preserving security framework for cognitive radio networks. IETE Technical Review, 30(2), 142–148.

    Article  Google Scholar 

  30. Nuallain, E. O. (2008, October). A proposed propagation-based methodology with which to address the hidden node problem and security/reliability issues in cognitive radio. In Wireless Communications, Networking and Mobile Computing, 2008. WiCOM’08 IEEE (pp. 1–5).

    Google Scholar 

  31. Jianwu, L. I., Zebing, F., Zhiyong, F., & Ping, Z. (2015). A survey of security issues in cognitive radio networks. China Communications, 12(3), 132–150.

    Article  Google Scholar 

  32. Jiang, Q. M., Chen, H. F., Xie, L., & Wang, K. (2017). On detecting primary user emulation attack using channel impulse response in the cognitive radio network. Frontiers of Information Technology and Electronic Engineering, 18(10), 1665–1676.

    Article  Google Scholar 

  33. Ta, D. T., Nguyen-Thanh, N., Maillé, P., & Nguyen, V. T. (2018). Strategic surveillance against primary user emulation attacks in cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking, 4, 582.

    Article  Google Scholar 

  34. Shah, H. A., & Koo, I. (2018). A novel physical layer security scheme in OFDM-based cognitive radio networks. IEEE Access, 6, 29486.

    Article  Google Scholar 

  35. Ho-Van, K., & Do-Dac, T. (2018). Reliability-security trade-off analysis of cognitive radio networks with jamming and licensed interference. Wireless Communications and Mobile Computing, 2018, 1.

    Article  Google Scholar 

  36. Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3), 382–401.

    Article  Google Scholar 

  37. Feng, J., Zhang, M., Xiao, Y., & Yue, H. (2018). Securing cooperative spectrum sensing against collusive SSDF attack using XOR distance analysis in cognitive radio networks. Sensors, 18(2), 370.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Murmu, M.K., Singh, A.K. (2020). Security Issues in Cognitive Radio Ad Hoc Networks. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics