Wireless Security: Models, Threats, and Solutions
Wireless Security: Models, Threats, and Solutions
IEEE Spectrum
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks
A Secure Authenticated Key Agreement Protocol For Wireless Security
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
Adaptive Intrusion Detection in Wireless Sensor Networks
IPC '07 Proceedings of the The 2007 International Conference on Intelligent Pervasive Computing
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
A survey on spectrum management in cognitive radio networks
IEEE Communications Magazine
Toward secure distributed spectrum sensing in cognitive radio networks
IEEE Communications Magazine
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
Trust based security for cognitive radio networks
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Higher layer issues in cognitive radio network
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Review: Cognitive radio network security: A survey
Journal of Network and Computer Applications
Digital signature-based authentication framework in cognitive radio networks
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
Recent developments of wireless communication lead to the problem of growing spectrum shortage. Cognitive radio, as a novel technology, tends to solve this problem by dynamically utilizing the spectrum. Security in cognitive radio network becomes a challenging issue, since more chances are given to attackers by cognitive radio technology compared to general wireless network. These weaknesses are introduced by the nature of cognitive radio, and they may cause serious impact to the network quality of service. However, at present there are no specific secure protocols for cognitive radio networks. Motivated by this, the current state of art in security of cognitive radio network is reviewed in this paper. We focus on analyzing the security system at the macroscopic level, where both protection and detection are significant parts for ensuring security of the whole network. Special characteristics of cognitive radio network in different protocol layers are also investigated, such as physical layer, link layer, network layer, transport layer and application layer.