Abstract
The cognitive radio network (CRN) is an interesting variant of opportunistic networks. It is gaining steep popularity due to its peculiar capability in mitigating spectrum scarcity problem. Due to the same reason it has different security challenges than other wireless and opportunistic networks, in particular. The chapter accounts security-related research issues, domains of study, security implications and various approaches proposed in the literature to handle them. In the interest of space, the illustration provides crisp summary of the topic instead of exhaustive presentation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks, 50(13), 2127–2159.
Granelli, F., Pawelczak, P., Prasad, R. V., Subbalakshmi, K. P., Chandramouli, R., Hoffmeyer, J. A., & Berger, H. S. (2010). Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities. IEEE Communications Magazine, 48(1), 71.
Orumwense, E. F., Oyerinde, O., & Mneney, S. H. (2017). Improved cooperative spectrum sensing under primary user emulation attacks in cognitive radio networks. Journal of Engineering Research, 5(3), 1–18.
Akyildiz, I. F., Lee, W. Y., & Chowdhury, K. R. (2009). CRAHNs: Cognitive radio ad hoc networks. Ad Hoc Networks, 7(5), 810–836.
Mansoor, N., Islam, A. M., Zareei, M., Baharun, S., Wakabayashi, T., & Komaki, S. (2015). Cognitive radio ad-hoc network architectures: A survey. Wireless Personal Communications, 81(3), 1117–1142.
Gupta, B. B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global. https://doi.org/10.4018/978-1-5225-0105-3.
Ko, H., Mesicek, L., Choi, J., Choi, J., & Hwang, S. (2018). A study on secure contents strategies for applications with DRM on cloud computing. International Journal of Cloud Applications and Computing (IJCAC), 8(1), 143–153. https://doi.org/10.4018/IJCAC.2018010107.
Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE IoT Journal, 6, 1402. https://doi.org/10.1109/JIOT.2018.2844727.
Gupta, B. B., Agrawal, D. P., & Wang, H. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (p. 666). Boca Raton, FL: CRC Press, Taylor & Francis.
Fragkiadakis, A. G., Tragos, E. Z., & Askoxylakis, I. G. (2013). A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys and Tutorials, 15(1), 428–445.
Holcomb, S., & Rawat, D. B. (2016, March). Recent security issues on cognitive radio networks: A survey. In SoutheastCon (pp. 1–6). Piscataway, NJ: IEEE.
Salameh, H. B., Almajali, S., Ayyash, M., & Elgala, H. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5, 1904.
Yucek, T., & Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Communications Surveys and Tutorials, 11(1), 116–130.
Jo, M., Han, L., Kim, D., & In, H. P. (2013). Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Network, 27(3), 46–50.
Baldini, G., Sturman, T., Biswas, A. R., Leschhorn, R., Godor, G., & Street, M. (2012). Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead. IEEE Communications Surveys and Tutorials, 14(2), 355–379.
Nagpal, C. K. (2018). A game theory based solution for security challenges in CRNs. 3D Research, 9(1), 11.
Meghanathan, N., & Reddy, Y. B. (2013). Cognitive radio technology applications for wireless and mobile ad hoc networks. IGI Global book series in AWTT. https://doi.org/10.4018/978-1-4666-4221-8.
Agarwal, S., Shakya, R. K., Singh, Y. N., & Roy, A. (2012). DSAT-MAC: Dynamic slot allocation based TDMA MAC protocol for cognitive radio networks. In International Conference on Wireless and Optical Communications Networks (WOCN) (pp. 1–6).
Khasawneh, M., & Agarwal, A. (2017). A collaborative approach for monitoring nodes behavior during spectrum sensing to mitigate multiple attacks in cognitive radio networks. Security and Communication Networks, 2017, 1.
Mathur, C. N., & Subbalakshmi, K. P. (2007). Security issues in cognitive radio networks. In Cognitive networks: Towards self-aware networks (pp. 284–293). Hoboken, NJ: Wiley.
Akram, M. W., Salman, M., Shah, M. A., & Ahmed, M. M. (2017, September). A review: Security challenges in cognitive radio networks. In Automation and computing (ICAC) (pp. 1–6). Piscataway, NJ: IEEE.
Ren, K., Zhu, H., Han, Z., & Poovendran, R. (2013). Security in cognitive radio networks. Proceedings of IEEE Network, 27, 2–3.
Kang, T., & Guo, L. (2015). Physical layer security in cognitive radio based self-organization network. Mobile Networks and Applications, 20(4), 459–465.
Bouabdellah, M., Kaabouch, N., El Bouanani, F., & Ben-Azza, H. (2018). Network layer attacks and countermeasures in cognitive radio networks: A survey. Journal of Information Security and Applications, 38, 40–49.
Babu, B. R., Tripathi, M., Gaur, M. S., Gopalani, D., & Jat, D. S. (2015, May). Cognitive radio ad-hoc networks: Attacks and its impact. In Emerging Trends in Networks and Computer Communications (ETNCC) (pp. 125–130). IEEE.
Hossain, A., & Sarkar, N. I. (2015, November). Cross layer rendezvous in cognitive radio ad-hoc networks. In Telecommunication Networks and Applications Conference (ITNAC) (pp. 149–154). IEEE.
Soliman, J. N., Mageed, T. A., & El-Hennawy, H. M. (2017, December). Taxonomy of security attacks and threats in cognitive radio networks. In Electronics, Communications and Computers (JAC-ECC), 2017 Japan-Africa Conference on IEEE (pp. 127–131).
Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.
Kim, H. (2013). Privacy preserving security framework for cognitive radio networks. IETE Technical Review, 30(2), 142–148.
Nuallain, E. O. (2008, October). A proposed propagation-based methodology with which to address the hidden node problem and security/reliability issues in cognitive radio. In Wireless Communications, Networking and Mobile Computing, 2008. WiCOM’08 IEEE (pp. 1–5).
Jianwu, L. I., Zebing, F., Zhiyong, F., & Ping, Z. (2015). A survey of security issues in cognitive radio networks. China Communications, 12(3), 132–150.
Jiang, Q. M., Chen, H. F., Xie, L., & Wang, K. (2017). On detecting primary user emulation attack using channel impulse response in the cognitive radio network. Frontiers of Information Technology and Electronic Engineering, 18(10), 1665–1676.
Ta, D. T., Nguyen-Thanh, N., Maillé, P., & Nguyen, V. T. (2018). Strategic surveillance against primary user emulation attacks in cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking, 4, 582.
Shah, H. A., & Koo, I. (2018). A novel physical layer security scheme in OFDM-based cognitive radio networks. IEEE Access, 6, 29486.
Ho-Van, K., & Do-Dac, T. (2018). Reliability-security trade-off analysis of cognitive radio networks with jamming and licensed interference. Wireless Communications and Mobile Computing, 2018, 1.
Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3), 382–401.
Feng, J., Zhang, M., Xiao, Y., & Yue, H. (2018). Securing cooperative spectrum sensing against collusive SSDF attack using XOR distance analysis in cognitive radio networks. Sensors, 18(2), 370.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Murmu, M.K., Singh, A.K. (2020). Security Issues in Cognitive Radio Ad Hoc Networks. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)