Abstract
Electromagnetic spectrum is a scarce, important and a very useful resource. However, this resource has not been utilized effectively or in other words most of the spectrum remains vacant. Due to fixed or licensed spectrum allocation the spectrum remains vacant for a considerable amount of time. Cognitive radio, a wireless and an intelligent technology was proposed by Joseph Mitola to make efficient use of spectrum. The use of EM wave as a transmission medium makes security a major concern in Cognitive Radio as these are easily susceptible to attacks. Also, being a flexible wireless network technology it is susceptible to traditional threats as well as unique attacks which will have an adverse effects on its performance. This paper introduces the Cognitive Radio technology and mainly focuses on security issues related to it. Further, we present a layered classification of security issues of this exciting area of communication technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Fragkiadakis, E. Tragos, I. Askoxylakis, A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks. IEEE Commun. Surv. Tutorials PP(99), 1–18 (2012)
T. Clancy, N. Goergen, Security in cognitive radio networks: threats and mitigation. in Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom) (2008), pp. 1–8
S. Haykin, Cognitive Radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 23, 201–220 (2005)
L.E. Doyle, Essentials of cognitive radio, Cambridge wireless essentials series (2009)
G. Baldini, T. Sturman, A.R. Biswas, Security aspects in software defined radio and cognitive radio networks : a survey and a way ahead. IEEE Commun. Surv. Tutorial 14 (2012)
J. Mitola, Cognitive radio: An integrated agent architecture for software defined radio, doctor of technology, Royal Institute of Technology (KTH), Stockholm, Sweden (2000)
W. El-Hajj, H. Safa, M. Guizani, Survey of security issues in cognitive radio networks
H. Kim, Privacy preserving security framework for cognitive radio networks, IETE Technical Review, vol. 30, Issue 2 (2013)
D. Hlavacek, J. Morris Chang, A layered approach to cognitive radio network security: a survey, computer network (2014)
M. Haghighat, S.M. Sadough, Cooperative spectrum sensing in cognitive radio networks under primary user emulation attacks. in Sixth International Symposium on Telecommunications (2012), pp. 148–151
A. Attar, H. Tang, A.V. Vasilakos, F. Richard Yu, V.C.M. Leung, A survey of security challenges in cognitive radio networks: solutions and future research directions
C.N. Mathur, K.P. Subbalakshmi, Security issues in cognitive radio networks: cognitive networks: towards self aware networks (2007)
R. Chen, J.M. Park, J.M. Reed, Defense against primary user emulation attacks. IEEE J. Sel. Areas Commun. 26(1), 25–37 (2008)
A. Rawat, P. Anand, H. Chen, P. Varshney, Countering byzantine attacks in cognitive radio networks, acoustics speech and signal processing (ICASSP). in IEEE International Conference (2010), pp. 3098–3101
F.K. Jondral, Software-defined radio—basic and evolution to cognitive radio, EURASIP Journal on Wireless Communications and Networking (2005)
R. Chen, J.M. Park, Ensuring trustworthy spectrum sensing in Cognitive Radio Networks. in IEEE Workshop on Networking Technologies for Software Defined Radio (SDR’06) (2006), pp. 110–119
Y. Liu, P. Ning, H. Dai, Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. in Proceedings of IEEE Symposium Security and Privacy (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Madbushi, S., Raut, R., Rukmini, M.S.S. (2016). Security Issues in Cognitive Radio: A Review. In: Satapathy, S., Rao, N., Kumar, S., Raj, C., Rao, V., Sarma, G. (eds) Microelectronics, Electromagnetics and Telecommunications. Lecture Notes in Electrical Engineering, vol 372. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2728-1_12
Download citation
DOI: https://doi.org/10.1007/978-81-322-2728-1_12
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2726-7
Online ISBN: 978-81-322-2728-1
eBook Packages: EngineeringEngineering (R0)