Skip to main content

Investigating Spectrum Sensing Security Threats in Cognitive Radio Networks

  • Conference paper
  • First Online:
Ad Hoc Networks

Abstract

Cognitive Radio Networks (CRN) technology was proposed as a solution to the challenges of overcrowding and underutilization of spectrum bands. CRN is a subset of wireless networks and as such, is susceptible to traditional wireless networks security attacks. In addition, it is also vulnerable to new security attacks such as cooperative sensing related attacks. CRN has an ability to dynamically adapt to the radio environment and thereafter make decisions to access spectrum holes opportunistically.

In this paper, we evaluate spectrum sensing security attacks in CRN. Spectrum sensing is fundamental phase of the cognitive cycle of the CRN however, when compromised; it impacts negatively on the functionality of the cognitive network. Spectrum Sensing Data Falsification (SSDF) attack is one of the security challenges of the CRN and it occurs largely in CRN implementing cooperative spectrum sensing (CSS). CSS is a sensing strategy which increases the detection rate of primary users when secondary users share the sensing data. The SSDF attack degrades the performance of the CRN resulting in the poor utilization of the free spectrum. The study therefore evaluates the Cooperative Neighbouring Cognitive Radio Nodes (COOPON) and the pinokio schemes in a simulated environment. The results show that the COOPON scheme is effective in the mitigation of the effects of malicious users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Monika, B., Chandra, K.R., Kumar, R.R.: Spectrum sensing techniques and issues in cognitive radio. IJETT 4(4), 695–699 (2013)

    Google Scholar 

  2. Dobaria, A., Sodhatar, S.: A literature survey on efficient spectrum utilization: cognitive radio technology. Int. J. Innov. Emerg. Res. Eng. 2(1), 72–75 (2015)

    Google Scholar 

  3. 2015-caps-infocus, 3 December 2015. http://www.capsindia.org/2015-caps-infocus. Accessed 6 June 2016

  4. Chetan, M., Subhalakshami, K.: Security issues in cognitive radio. In: Cognitive network: Towards Self-Aware Networks (2007)

    Google Scholar 

  5. Xiaofan, H., Huaiyu, D.: A Byzantine attack defender in cognitive radio. In: IEEE International Symposium on Information Theory, Cambridge (2012)

    Google Scholar 

  6. Lavanis, N., Jalihal, D.: Performance of p-norm detector in cognitive radio networks with cooperative spectrum sensing in presence of malicious users. Wirel. Commun. Mob. Comput. 2017(2), 1–8 (2017)

    Article  Google Scholar 

  7. Srinu, S., Mishra, A.K.: Efficient elimination of erroneous nodes in cooperative sensing for cognitive radio networks. Comput. Electr. Eng. 52, 284–292 (2016)

    Article  Google Scholar 

  8. Premarathne, U.S., Khalil, I., Atiquzzaman, M.: Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid. Ad Hoc Netw. 41, 15–29 (2016)

    Article  Google Scholar 

  9. Lin, H., Hu, J., Huang, C., Xu, L., Wu, B.: Secure cooperative spectrum sensing and allocation in distributed cognitive radio networks. Int. J. Distrib. Sens. Netw. 2015, 194–206 (2015)

    Article  Google Scholar 

  10. Luo, L., Roy, S.: Analysis of search schemes in cognitive. In: Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2007), pp. 647–654, June 2017

    Google Scholar 

  11. Pandharipande, A., Kim, J.M., Mazzarese, D., Ji, B.: Wireless RANs: technology proposal package for IEEE 802.22. In: IEEE 802.22 WG on WRANs (2005)

    Google Scholar 

  12. Ruiliang, C., Jung-Min, P., Thomas, H.Y., Jeffrey, H.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag. 46, 50–55 (2008)

    Article  Google Scholar 

  13. Shei, Y., Su, Y.T.: A sequential test based cooperative spectrum sensing scheme for cognitive radios. In: 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Cannes (2008)

    Google Scholar 

  14. Khabbazian, M., Kaligineedi, P., Bhargava, V.: Secure cooperative sensing techniques for cognitive radio systems. In: 2008 IEEE International Conference on Communications, Beijing (2008)

    Google Scholar 

  15. Rawat, A.S., Anand, P., Chen, H., Varshney, P.K.: Countering byzantine attacks in cognitive radio networks. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, Dallas, TX (2010)

    Google Scholar 

  16. Lu, L., Chang, S.-Y., Zhang, J., Qian, L., Wen, J., Lau, V.K.N., Cheng, R.S., Murch, R.D., Mow, W.H., Letaief, K.B.: Technology proposal clarifications for IEEE 802.22 WRAN systems. In: IEEE P802.22 Wireless RANs, May 2006

    Google Scholar 

  17. Hillenbrand, J., Weiss, T., Jondral, F.: Calculation of detection and false alarm probabilities in spectrum pooling systems. IEEE Commun. Lett. 9(4), 349–351 (2005)

    Article  Google Scholar 

  18. Tan, K., Jana, S., Pathak, P., Mohapatra, P.: On insider misbehavior detection in cognitive radio networks. IEEE Netw. 27(3), 4–9 (2013)

    Article  Google Scholar 

  19. Jo, M., Han, L., Kim, D., In, H.P.: Selfish attacks and detection in cognitive radio ad-hoc networks. IEEE Netw. 27(3), 46–50 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sekgoari Mapunya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mapunya, S., Velempini, M. (2018). Investigating Spectrum Sensing Security Threats in Cognitive Radio Networks. In: Zhou, Y., Kunz, T. (eds) Ad Hoc Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 223. Springer, Cham. https://doi.org/10.1007/978-3-319-74439-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74439-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74438-4

  • Online ISBN: 978-3-319-74439-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics