Skip to main content

Secure Spectrum Sensing and Decision in Cognitive Radio Networks

  • Conference paper
Recent Trends in Wireless and Mobile Networks (WiMo 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 84))

Included in the following conference series:

Abstract

Cognitive radios (CRs) are proposed as a solution to inefficient utilization of the overcrowding spectrum and opening space for the new wireless communication technologies. CRs have the ability to monitor the spectrum activities and decide on the best transmission channel depending on the measurements; thereby provide agility in spectrum access. However, new abilities of CRs are exposed to new security threats in addition to the existing security threats experienced in wireless networks. In this paper, we briefly evaluate these new security threats and provide cryptographic and non-cryptographic countermeasures to them. We also present the proposed security solution in [1] and provide the security evaluation of this proposed architecture. Moreover, we propose a security architecture to mitigate the threats to spectrum sensing and decision making accordingly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jakimoski, G., Subbalakshmi, K.: Towards secure spectrum decision. In: IEEE Intl. Conf. on Commun., ICC 2009 (2009)

    Google Scholar 

  2. Brown, T., Sethi, A.: Potential cognitive radio denial of service attacks and remedies. In: Proceedings of the international symposium on advanced radio technologies, pp. 26–28 (2007)

    Google Scholar 

  3. Jakimoski, G., Subbalakshmi, K.: Denial-of-service attacks on dynamic spectrum access networks. In: CogNets Workshop, IEEE International Conference on Communications Workshops, pp. 524–528 (2008)

    Google Scholar 

  4. Brown, T., Sethi, A.: Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment. Mobile Networks and Applications 13, 516–532 (2008)

    Article  Google Scholar 

  5. Mathur, C., Subbalakshmi, K.: Digital Signatures for Centralized DSA Networks. In: 4th IEEE Consumer Communications and Networking Conference, CCNC 2007, pp. 1037–1041 (2007)

    Google Scholar 

  6. Jin, Z., Anand, S., Subbalakshmi, K.: Detecting primary user emulation attacks in dynamic spectrum access networks. In: IEEE Intl. Conf. on Commun., ICC 2009 (2009)

    Google Scholar 

  7. Chen, R., Park, J., Reed, J.: Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications 26, 25–37 (2008)

    Article  Google Scholar 

  8. Anand, S., Jin, Z., Subbalakshmi, K.: An analytical model for primary user emulation attacks in cognitive radio networks. In: Proc. IEEE Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2008), pp. 1–6 (2008)

    Google Scholar 

  9. ETSI: Telecommunications and internet protocol harmonization over networks (TIPHON) release 4; protocol framework definition; methods and protocols for security; part 1: Threat analysis. Technical Specification. Technical Report ETSI TS 102 165-1 V4.1.1, ETSI (2003)

    Google Scholar 

  10. Clancy, T., Goergen, N.: Security in cognitive radio networks: Threats and mitigation. In: International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Crowncom 2008 (2008)

    Google Scholar 

  11. Rui-liang, C., Park, J., Hou, Y., et al.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine 46, 50–55 (2008)

    Article  Google Scholar 

  12. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Florida (2001)

    Google Scholar 

  13. Arslan, M., Alagoz, F.: Security issues and performance study of key management techniques over satellite links. In: 11th Intenational Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks, pp. 122–128 (2006)

    Google Scholar 

  14. Cordeiro, C., Challapali, K., Birru, D., Shankar, S.: IEEE 802.22: an introduction to the first wireless standard based on cognitive radios. Journal of communications 1, 38–47 (2006)

    Article  Google Scholar 

  15. Burbank, J.: Security in cognitive radio networks: The required evolution in approaches to wireless network security. In: 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom 2008, pp. 1–7 (2008)

    Google Scholar 

  16. Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C. Wiley, India (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ersöz, S.D., Bayhan, S., Alagöz, F. (2010). Secure Spectrum Sensing and Decision in Cognitive Radio Networks. In: Özcan, A., Chaki, N., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. WiMo 2010. Communications in Computer and Information Science, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14171-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14171-3_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14170-6

  • Online ISBN: 978-3-642-14171-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics