Modeling the lion attack in cognitive radio networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Trust based security for cognitive radio networks
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Towards a cooperative intrusion detection system for cognitive radio networks
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Robust detection of primary user emulation attacks in IEEE 802.22 networks
Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management
Cooperative detection of primary user emulation attacks in CRNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Review: Cognitive radio network security: A survey
Journal of Network and Computer Applications
Digital signature-based authentication framework in cognitive radio networks
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio device uses general purpose computer processors that run radio applications software to perform signal processing. The use of this software enables the device to sense and understand its environment and actively change its mode of operation based on its observations. Unfortunately, this solution entails new security challenges. Our objective in this paper is to analyze the security issues of the main recent developments and architectures of cognitive radio networks. We present vulnerabilities inherent to those systems, identify novel types of abuse, classify attacks, and analyze their impact on the operation of cognitive radio-based systems. Moreover, we discuss and propose security solutions to mitigate such threats. Copyright © 2010 John Wiley & Sons, Ltd. Cognitive radio emerges as a promising technology to deal with the scarcity of radio electromagnetic spectrum. Cognitive radio devices run the radio applications software by means of which they are able to sense and understand their environment and change their mode of operation according to their observations. In this paper we present an analysis of the vulnerabilities inherent to these systems, identify the potential threats to cognitive radio networks and propose a set of countermeasures to mitigate them. Copyright © 2010 John Wiley & Sons, Ltd.