Abstract
Cognitive radios (CRs) are proposed as a solution to inefficient utilization of the overcrowding spectrum and opening space for the new wireless communication technologies. CRs have the ability to monitor the spectrum activities and decide on the best transmission channel depending on the measurements; thereby provide agility in spectrum access. However, new abilities of CRs are exposed to new security threats in addition to the existing security threats experienced in wireless networks. In this paper, we briefly evaluate these new security threats and provide cryptographic and non-cryptographic countermeasures to them. We also present the proposed security solution in [1] and provide the security evaluation of this proposed architecture. Moreover, we propose a security architecture to mitigate the threats to spectrum sensing and decision making accordingly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jakimoski, G., Subbalakshmi, K.: Towards secure spectrum decision. In: IEEE Intl. Conf. on Commun., ICC 2009 (2009)
Brown, T., Sethi, A.: Potential cognitive radio denial of service attacks and remedies. In: Proceedings of the international symposium on advanced radio technologies, pp. 26–28 (2007)
Jakimoski, G., Subbalakshmi, K.: Denial-of-service attacks on dynamic spectrum access networks. In: CogNets Workshop, IEEE International Conference on Communications Workshops, pp. 524–528 (2008)
Brown, T., Sethi, A.: Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment. Mobile Networks and Applications 13, 516–532 (2008)
Mathur, C., Subbalakshmi, K.: Digital Signatures for Centralized DSA Networks. In: 4th IEEE Consumer Communications and Networking Conference, CCNC 2007, pp. 1037–1041 (2007)
Jin, Z., Anand, S., Subbalakshmi, K.: Detecting primary user emulation attacks in dynamic spectrum access networks. In: IEEE Intl. Conf. on Commun., ICC 2009 (2009)
Chen, R., Park, J., Reed, J.: Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications 26, 25–37 (2008)
Anand, S., Jin, Z., Subbalakshmi, K.: An analytical model for primary user emulation attacks in cognitive radio networks. In: Proc. IEEE Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN 2008), pp. 1–6 (2008)
ETSI: Telecommunications and internet protocol harmonization over networks (TIPHON) release 4; protocol framework definition; methods and protocols for security; part 1: Threat analysis. Technical Specification. Technical Report ETSI TS 102 165-1 V4.1.1, ETSI (2003)
Clancy, T., Goergen, N.: Security in cognitive radio networks: Threats and mitigation. In: International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Crowncom 2008 (2008)
Rui-liang, C., Park, J., Hou, Y., et al.: Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine 46, 50–55 (2008)
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Florida (2001)
Arslan, M., Alagoz, F.: Security issues and performance study of key management techniques over satellite links. In: 11th Intenational Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks, pp. 122–128 (2006)
Cordeiro, C., Challapali, K., Birru, D., Shankar, S.: IEEE 802.22: an introduction to the first wireless standard based on cognitive radios. Journal of communications 1, 38–47 (2006)
Burbank, J.: Security in cognitive radio networks: The required evolution in approaches to wireless network security. In: 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom 2008, pp. 1–7 (2008)
Schneier, B.: Applied cryptography: protocols, algorithms, and source code in C. Wiley, India (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ersöz, S.D., Bayhan, S., Alagöz, F. (2010). Secure Spectrum Sensing and Decision in Cognitive Radio Networks. In: Özcan, A., Chaki, N., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. WiMo 2010. Communications in Computer and Information Science, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14171-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-14171-3_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14170-6
Online ISBN: 978-3-642-14171-3
eBook Packages: Computer ScienceComputer Science (R0)