Distributed Detection and Data Fusion
Distributed Detection and Data Fusion
Introduction to Reinforcement Learning
Introduction to Reinforcement Learning
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
Dynamic spectrum access in DTV whitespaces: design rules, architecture and algorithms
Proceedings of the 15th annual international conference on Mobile computing and networking
ACM SIGMOBILE Mobile Computing and Communications Review
Channel fragmentation in dynamic spectrum access systems: a theoretical study
Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Dogfight in spectrum: jamming and anti-jamming in multichannel cognitive radio systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
CatchIt: detect malicious nodes in collaborative spectrum sensing
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Tradeoff between spoofing and jamming a cognitive radio
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Distributed detection in the presence of Byzantine attack in large wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Anti-jamming communication in cognitive radio networks with unknown channel statistics
ICNP '11 Proceedings of the 2011 19th IEEE International Conference on Network Protocols
Spectrum pooling: an innovative strategy for the enhancement of spectrum efficiency
IEEE Communications Magazine
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Editorial: Computer communications: Present status and future challenges
Computer Communications
Hi-index | 0.24 |
Cognitive radio networks are envisioned to drive the next generation wireless networks that can dynamically optimize spectrum use. However, the deployment of such networks is hindered by the vulnerabilities that these networks are exposed to. Securing communications while exploiting the flexibilities offered by cognitive radios still remains a daunting challenge. In this survey, we put forward the security concerns and the vulnerabilities that threaten to plague the deployment of cognitive radio networks. We classify various types of vulnerabilities and provide an overview of the research challenges. We also discuss the various techniques that have been devised and analyze the research developments accomplished in this area. Finally, we discuss the open research challenges that must be addressed if cognitive radio networks were to become a commercially viable technology.