학술논문

A survey on security in Cognitive Radio networks
Document Type
Conference
Source
2014 6th International Conference on Computer Science and Information Technology (CSIT) Computer Science and Information Technology (CSIT), 2014 6th International Conference on. :64-70 Mar, 2014
Subject
Communication, Networking and Broadcast Technologies
Computing and Processing
Robotics and Control Systems
Sensors
Cognitive radio
Linear programming
Authentication
Physical layer
Protocols
Security
Attack
Primary User (PU)
Secondary User (SU)
Language
Abstract
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cognitive radio system is wireless security. New classes of security threats and challenges have been introduced in the cognitive radio systems, and providing strong security may prove to be the most difficult aspect of making cognitive radio a long-term commercially-viable concept. This paper addresses the main challenges, security attacks and their mitigation techniques in cognitive radio networks. The attacks showed are organized based on the protocol layer that an attack is operating on.