Skip to main content

Security Analysis on Cognitive Radio Network

  • Conference paper
  • First Online:
Smart Innovations in Communication and Computational Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 669))

  • 453 Accesses

Abstract

In traditional networking system, there is spectrum shortage problem. Therefore, cognitive radio (CR) is introduced to get the unlicensed users along with licensed users to maximize the bandwidth utilization. In that case, ensuring security is one major challenge and security issues are classified different types of attack. One major attack is known as primary user emulation attack (PUEA) that can affect the bandwidth utilization in CR network. CR network performance can be increased by mitigating the common security threats. The performance analysis based on miss detection and false alarm for primary user emulation attack in CR network has been observed. With the proposed model, the possibility of miss detection is successfully minimized with the increment of distance from the primary transmitter to primary exclusive region.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Mitola and G. Q. Maguire, Cognitive radio: making software radios more personal, IEEE Personal Communications, vol. 6, no. 4, pp. 1318, Aug 1999.

    Google Scholar 

  2. I. F. Akyildiz, W. y. Lee, M. C. Vuran and S. Mohanty, “A survey on spectrum management in cognitive radio networks,” in IEEE Communications Magazine, vol. 46, no. 4, pp. 40–48, April 2008. https://doi.org/10.1109/mcom.2008.4481339.

  3. D. A. Khare and M. Saxena, “Attacks and preventions of cognitive radio network-a-survey,” International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), vol. 2, March 2013.

    Google Scholar 

  4. A. A. Sharifi and M. J. M. Niya, “Defense against ssdf attack in cognitive radio networks: Attack-aware collaborative spectrum sensing approach,” IEEE Communications Letters, vol. 20, no. 1, pp. 93–96, Jan 2016.

    Google Scholar 

  5. T. C. Clancy and N. Goergen, “Security in cognitive radio networks: Threats and mitigation,” in 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (Crown-Com 2008), May 2008, pp. 1–8.

    Google Scholar 

  6. S. Anand, Z. Jin, and K. P. Subbalakshmi, “An analytical model for primary user emulation attacks in cognitive radio networks,” in 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, Oct 2008, pp. 1–6.

    Google Scholar 

  7. R. Chen, J. M. Park, and J. H. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25–37, Jan 2008.

    Google Scholar 

  8. Y. Liu, P. Ning, and H. Dai, “Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures,” in 2010 IEEE Symposium on Security and Privacy, May 2010, pp. 286–301.

    Google Scholar 

  9. Y. Zheng, Y. Chen, C. Xing, J. Chen, and T. Zheng, “A scheme against primary user emulation attack based on improved energy detection,” in 2016 IEEE International Conference on Information and Automation (ICIA), Aug 2016, pp. 2056–2060.

    Google Scholar 

  10. T. N. Le, W. L. Chin, and Y. H. Lin, “Non-cooperative and cooperative puea detection using physical layer in mobile ofdm-based cognitive radio networks,” in 2016 International Conference on Computing, Networking and Communications (ICNC), Feb 2016, pp. 1–5.

    Google Scholar 

  11. Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting primary user emulation attacks in dynamic spectrum access networks,” in 2009 IEEE International Conference on Communications, June 2009, pp. 1–5.

    Google Scholar 

  12. D. Pu and A. M. Wyglinski, “Primary-user emulation detection using database-assisted frequency-domain action recognition,” IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4372–4382, Nov 2014.

    Google Scholar 

  13. Z. Jin, S. Anand, and K. P. Subbalakshmi, “Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing,” SIGMOBILE Mob. Computer. Community. Rev., vol. 13, no. 2, pp. 74–85, Sep. 2009. [Online]. Available: http://doi.acm.org/10.1145/1621076.1621084.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mst. Najia Islam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nasnin, F., Najia Islam, M., Chakrabarty, A. (2019). Security Analysis on Cognitive Radio Network. In: Panigrahi, B., Trivedi, M., Mishra, K., Tiwari, S., Singh, P. (eds) Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 669. Springer, Singapore. https://doi.org/10.1007/978-981-10-8968-8_26

Download citation

Publish with us

Policies and ethics