Skip to main content

Security Issues in Cognitive Radio: A Review

  • Conference paper
  • First Online:
Microelectronics, Electromagnetics and Telecommunications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 372))

Abstract

Electromagnetic spectrum is a scarce, important and a very useful resource. However, this resource has not been utilized effectively or in other words most of the spectrum remains vacant. Due to fixed or licensed spectrum allocation the spectrum remains vacant for a considerable amount of time. Cognitive radio, a wireless and an intelligent technology was proposed by Joseph Mitola to make efficient use of spectrum. The use of EM wave as a transmission medium makes security a major concern in Cognitive Radio as these are easily susceptible to attacks. Also, being a flexible wireless network technology it is susceptible to traditional threats as well as unique attacks which will have an adverse effects on its performance. This paper introduces the Cognitive Radio technology and mainly focuses on security issues related to it. Further, we present a layered classification of security issues of this exciting area of communication technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Fragkiadakis, E. Tragos, I. Askoxylakis, A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks. IEEE Commun. Surv. Tutorials PP(99), 1–18 (2012)

    Google Scholar 

  2. T. Clancy, N. Goergen, Security in cognitive radio networks: threats and mitigation. in Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom) (2008), pp. 1–8

    Google Scholar 

  3. S. Haykin, Cognitive Radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23, 201–220 (2005)

    Article  Google Scholar 

  4. L.E. Doyle, Essentials of cognitive radio, Cambridge wireless essentials series (2009)

    Google Scholar 

  5. G. Baldini, T. Sturman, A.R. Biswas, Security aspects in software defined radio and cognitive radio networks : a survey and a way ahead. IEEE Commun. Surv. Tutorial 14 (2012)

    Google Scholar 

  6. J. Mitola, Cognitive radio: An integrated agent architecture for software defined radio, doctor of technology, Royal Institute of Technology (KTH), Stockholm, Sweden (2000)

    Google Scholar 

  7. W. El-Hajj, H. Safa, M. Guizani, Survey of security issues in cognitive radio networks

    Google Scholar 

  8. H. Kim, Privacy preserving security framework for cognitive radio networks, IETE Technical Review, vol. 30, Issue 2 (2013)

    Google Scholar 

  9. D. Hlavacek, J. Morris Chang, A layered approach to cognitive radio network security: a survey, computer network (2014)

    Google Scholar 

  10. M. Haghighat, S.M. Sadough, Cooperative spectrum sensing in cognitive radio networks under primary user emulation attacks. in Sixth International Symposium on Telecommunications (2012), pp. 148–151

    Google Scholar 

  11. A. Attar, H. Tang, A.V. Vasilakos, F. Richard Yu, V.C.M. Leung, A survey of security challenges in cognitive radio networks: solutions and future research directions

    Google Scholar 

  12. C.N. Mathur, K.P. Subbalakshmi, Security issues in cognitive radio networks: cognitive networks: towards self aware networks (2007)

    Google Scholar 

  13. R. Chen, J.M. Park, J.M. Reed, Defense against primary user emulation attacks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)

    Article  Google Scholar 

  14. A. Rawat, P. Anand, H. Chen, P. Varshney, Countering byzantine attacks in cognitive radio networks, acoustics speech and signal processing (ICASSP). in IEEE International Conference (2010), pp. 3098–3101

    Google Scholar 

  15. F.K. Jondral, Software-defined radio—basic and evolution to cognitive radio, EURASIP Journal on Wireless Communications and Networking (2005)

    Google Scholar 

  16. R. Chen, J.M. Park, Ensuring trustworthy spectrum sensing in Cognitive Radio Networks. in IEEE Workshop on Networking Technologies for Software Defined Radio (SDR’06) (2006), pp. 110–119

    Google Scholar 

  17. Y. Liu, P. Ning, H. Dai, Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. in Proceedings of IEEE Symposium Security and Privacy (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shriraghavan Madbushi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Madbushi, S., Raut, R., Rukmini, M.S.S. (2016). Security Issues in Cognitive Radio: A Review. In: Satapathy, S., Rao, N., Kumar, S., Raj, C., Rao, V., Sarma, G. (eds) Microelectronics, Electromagnetics and Telecommunications. Lecture Notes in Electrical Engineering, vol 372. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2728-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2728-1_12

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2726-7

  • Online ISBN: 978-81-322-2728-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics