Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks

Syed Rizvi, John Mitchell, N. Showan
{"title":"Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks","authors":"Syed Rizvi, John Mitchell, N. Showan","doi":"10.1109/ICAICT.2014.7035911","DOIUrl":null,"url":null,"abstract":"Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2014.7035911","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
认知无线电(CR)网络安全漏洞分析与威胁评估
无线通信的最新进展每天都在造成频谱短缺的问题。最近,认知无线电(CR)试图通过动态利用自由频谱,允许次要用户与主要用户共存,而不会对其通信造成干扰,从而最大限度地减少这一问题。CR提供了许多有希望的好处,包括动态频谱共享、健壮的跨层自适应和协作网络。预计CR技术将成为信息通信技术创新的下一波浪潮。尽管人们正在大力探索CR的操作方面,但其安全方面却很少受到关注。由于CR网络的动态性以及它们相对更多地暴露于无线网络的事实,引入了全新类型的安全威胁和挑战,例如许可用户仿真,自私的不当行为和未经授权的频谱使用。为了在实践中成功部署CR技术,迫切需要提高对这些全新类型的安全威胁和挑战的理论理解。因此,在本文中,我们的主要目标是识别和调查CR网络(CRN)中已知的主要安全威胁。我们的第二个目标是强调潜在威胁如何利用通信堆栈不同层上存在的漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A new robust binary image embedding algorithm in discrete wavelet domain Polyalphabetic Euclidean ciphers Complex system state generalized presentation based on concepts Using a knowledge base in developing modification for MS Dynamics AX TOFI technology capabilities for data processing and visualization
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1