Security in cognitive radio networks: an example using the commercial IEEE 802.22 standard

  • Authors:
  • Apurva N. Mody;Ranga Reddy;Thomas Kiernan;Timothy X. Brown

  • Affiliations:
  • BAE Systems, Technology Solutions, Nashua, NH;US Army, CERDEC, S&TCD, SEAMS;US Army, CERDEC, S&TCD, SEAMS;University of Colorado at Boulder

  • Venue:
  • MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security in wireless networks is challenging. Security in cognitive radio networks (CRN) is even more challenging. This is because a CRN consists of cognitive radios (CR) which have many more functions and processes to account for, such as sensing, geolocation, spectrum management, access to the policy database etc. Each of these functions and processes need to be assessed for potential vulnerabilities and security mechanisms need to be provided for protection of not just the secondary users of the spectrum but also the primary users or the incumbents. This paper discusses the potential security vulnerabilities and the remediations for the same in a CRN with an example using a commercial IEEE 802.22 standard. Due to the unique characteristics ofthe CRs in a CRN, enhanced security mechanisms are required. The security mechanisms in CRN are divided into several security sub-layers which protect non-cognitive as well as cognitive functions of the system and the interactions between the two. This paper describes these security features as incorporated into the IEEE 802.22 standard. It is possible to apply similar security mechanisms for a military CRN.