SlideShare a Scribd company logo
1 of 7
Download to read offline
Attacks in Cognitive Radio Networks (CRN)
— A Survey
S. Bhagavathy Nanthini1 *
, M. Hemalatha1
, D. Manivannan1
and L. Devasena 2
1
School of Computing, SASTRA University, Thanjavur, Tamil Nadu-613401, India;
nanthubha@gmail.com, hemalatha@it.sastra.edu, dmv@cse.sastra.edu
2
School of EEE, SASTRA University, Thanjavur, Tamil Nadu-613401, India; devasena@eie.sastra.edu
Abstract
As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services
and their application leads to the spectrum scarcity. In order to utilize the available spectrum efficiently, “cognitive radio”-
The demanding technology is introduced. It is a dynamic technology that can sense the medium, utilizes the available white
spaces, for transmission by detecting its neighboring devices. The cognitive radio targets to increase the efficiency of the
spectrum changes without causing any intervention to the licensed users. Since cognitive radio works in the open network
space, it increases the chance of the attacker to show intervene on the spectral medium. So, the security becomes the key
factor. This leads to the realization of various security threats in the cognitive radio. There are various papers covering
the security issues over the threats in cognitive radio, but this paper provides an advanced survey over attacks and com-
mon threats and the possibility of securing the available spectrum from the attackers. In addition to that future scope and
challenges are also addressed. This survey will help the researchers to identify the space left out and the problems to be
attached related to security issues on cognitive radio.
*Author for correspondence
1. Introduction
For the past decade wireless technology shows a dras-
tic improvement in its technological and its application
aspects. his increases the number of available wireless
users. hese wireless users greatly rely on the available
radio spectrum, which leads to a scarcity in the available
spectrum. he Federal Communications Commission
(FCC) insists that certain portions of the RF spectrum
are made available for public use, which is vacant1
. hese
vacant spaces termed as White space devices comprised
with technologies to prevent interference, Technologies
constitutes spectrum sensing and geo-location capabili-
ties. Based on this a new promising technology called
cognitive radio is implemented. Mitola developed the
design of cognitive radio2
at the defense advanced project
research agency in U.S.A.
Indian Journal of Science and Technology, Vol 7(4), 530–536, April 2014
ISSN (Print) : 0974-6846
ISSN (Online) : 0974-5645
Keywords: Attacks, Digital Signatures, Cognitive-radio, Security, Spread Spectrum Modulation
Cognitive radio is deined as a sotware deined radio3,4
in wireless communication, that sense the environment
and detect the free space amongst the crowded channel,
and utilize the vacant space eiciently. It can also work on
the available channel as a secondary user paving way for
both the user without any interference6
. It is also deined
as a transceiver which has the ability to ind the avail-
able communication channel in the wireless spectrum
and perform transmission and reception characteristics
according to the available channel. While two users rely
on the particular channel there is a possibility of causing
interferences and also there occurs a wide chance for the
attackers to interfere the particular channel. In order to
avoid those possibilities, we are securing cognitive radio
in diferent methods7,8
.
his paper focuses on the analysis of security issues
in various perspectives on the cognitive radio networks.
S. Bhagavathy Nanthini, M. Hemalatha, D. Manivannan and L. Devasena
Indian Journal of Science and Technology 531
Vol 7 (4) | April 2014 | www.indjst.org
Vol 7 (4) | April 2014 | www.indjst.org
First view says the various methods of securing cognitive
radios relying over each layer, which is named as layered
attacks. his layered attack can be classiied based on the
various layers in the ISO / OSI model. Attacks falling
under physical layer is said to be a physical layer attack,
which rely on link layer is said to be MAC layer attacks,
and over the network layer is said to be network layer
attacks, and on transport layer is said to be transport layer
attacks. Based on the attacks, threats are detected and the
security measures are taken. Second view conveys the
method of securing the spectrum channel by combining
the cognitive radio with the spread spectrum modula-
tions9
. By using this method the unique characteristics
of the cognitive radio provide a protected and consistent
communication over the given medium. Here, the spread
spectrum modulations are combined with the encryption
technique so that it is possible to secure as well as it can
have the potential to switch over to the various frequency
bands. According to the third view, the CRN is secured
by means of Digital signature9
. Here, eicient Primary
User Identiication (PUI) from public key cryptography
is used to secure the communication made through the
channel. Using this method, the interruption caused by
the other unauthorized users can be avoided. he digital
signature method which uses the public key cryptography
is an efective method and is easily implementable since
its light weighted one and key management is simple.
Attackers launch their attack on each layer, but most
commonly they target on the lower level layer i.e. physi-
cal layer. When comparing the physical layer to the other
corresponding layers the security over the higher layers
is done through various higher layer authentication and
encryption methods. Here, they focus on securing cogni-
tive radio from the lowest layer i.e., physical layer, since
the CR relies heavily on PHY layer spectrum sensing
leaving the system vulnerable to physical layer attacks10,11
.
his physical layer is secured by means of location speciic
information’s by locating the inger prints. By promot-
ing PUE attack the extraction of transmitter ingerprints
is made multipath fading propagation environment.
Wavelett transformations detect the transmitter inger
prints and analyze them.
Another way of securing the cognitive radio is by
means of generating a random number with the help of
various algorithms. Here, all the algorithms that are used
to generate random number is compared and the one
superior algorithm is detected for securing the CR, One
such focused algorithm is ULSI.
In this paper Section 1 covers the methods of secur-
ing layered attacks in cognitive radio. Section2 deals with
securing cognitive radio by the spread spectrum modula-
tion techniques. Section3 points on the speciic layer and
the process of securing it. Section 4 discuss about secur-
ing by means of digital signature method.
2. Cognitive Radio Networks
Now a day, on the whole communication process totally
depends on the wireless medium. Technological improve-
ment reaches the peak level, and their user’s gets increase
in the higher rate. he wireless technology greatly depends
on the radio frequency spectrum, whereas the available
spectrum is low when compared to their utilization. hus
the efective utilization of these spectra becomes a neces-
sity, and so the cognitive radio becomes the promising
technology. he cognitive radio is termed as the sotware
deined radio technology that avails the license to the
unlicensed users without any inference.
It also considered as a model for wireless technol-
ogy which takes an intelligent decision by changing
its transmission or reception parameters based on the
neighboring networks without providing any interference
to other users. he cognitive radio network architecture
can be broadly divided into two clusters: primary network
also named as licensed users in the existing networks. he
other is cognitive radio networks otherwise called as unli-
censed users.
Figure 1 shows the architecture of the cognitive radio,
where the lower most layer is the physical layer. Next
to that there is link layer, network layer and transport
layer. Each layer performs diferent functions which are
explained in detail.
Physical layer performs three functions they are,
Spectrum sensing, Channel estimation and Data trans-
mission. Spectrum sensing becomes the much needed
task when compared to other two functions. As the name
implies, the task of spectrum sensing is to sense the avail-
able free medium for an efective transmission, also to
avoid the occurrence of any interference to potential
primary users in their vicinity. hen comes the channel
estimation, before setting up the link, the quality of the
sub channels is estimated based on their transmission
parameters such as transmit power, bit rate and coding. In
data transmission, ater assigning the spectrum by means
of spectrum sensing and channel estimation, the trans-
mission of data takes place. It should have the capability
Attacks in Cognitive Radio Networks (CNR) — A Survey
Indian Journal of Science and Technology
Vol 7 (4) | April 2014 | www.indjst.org
532
to operate at variable symbol rates, diferent channel cod-
ing schemes, power levels, and capable of using multiple
antennas to nullify the interference.
he functions of the link layers are group manage-
ment, link management, and medium access control. In
group management, there will be number of secondary
user groups, where the arriving user can join any of the
existing groups or form a new one through a universal
control channel. Link management covers the set up on
the link to enable the communication between any two
secondary users and also maintain the link until the
duration of the communication. Medium access control
controls the sub channels. If any of the sub channels is
used by the particular secondary users, then the particu-
lar channel cannot be used by any other secondary users.
Whereas the network layers and transport layers known
as the higher layer is used for the transferring of the data
allocating the particular network.
he characteristics over the cognitive radio are
Cognitive capability, Re-conigurability. Cognitive capa-
bility makes the device to sense the environment and to
choose the best available spectrum for transmission. his
becomes possible through the spectrum management
process. Re conigurability enables the device to make
it adapt to its environment by modifying its parameters
such as frequency, modulation etc. here are three dif-
ferent mechanisms in cognitive cycle to analyze the best
spectrum in the available environment. hey are given by
Spectrum sensing in which is used to sense the available
spectrum and chooses the best possible one, Spectrum
analysis is based on the information over the available
spectrum holes and analyzes the network and channel
characteristics for each spectrum hole, Spectrum decision
decides the appropriate spectrum hole for transmission.
3. Need for Security in CRN
Cognitive radio has the capability of adapting to the
environment and make changes based on their com-
munication capabilities for the secure communication.
Comparing the wired network and the wireless network,
the security is susceptible in case of wireless network.
When the data are sent via a wireless network, then there
is a possibility of eavesdropped, or can be altered, jam-
ming may take place. he cognitive radio networks have
a unique characteristic that security becomes essential
over it. his paper has summarized various possibilities
of attacks over it, and the security issues to be taken to
overcome those attacks in CRN.
4. Attacks Over the Layers and
its Detection
he best capability of the cognitive radio network is to
take advantage over the available vacant spaces in a
spectrum. A study done at Berkeley Wireless Research
Center (BWRC) says the frequency ranging from 1GHz
to 10 GHz is underutilized. hese nodes can sense the
Figure 1. Architecture of cognitive Radio
S. Bhagavathy Nanthini, M. Hemalatha, D. Manivannan and L. Devasena
Indian Journal of Science and Technology 533
Vol 7 (4) | April 2014 | www.indjst.org
environment and utilize the free spectrum. he challenges
over the Cognitive radio are transparency to primary
users and non-interference. So there occurs an increase
in the possibility for the attackers. he attacks over each
layer are analyzed by four major classes based on the layer
where the attack falls: Physical layer attack, Data Link
layer attack, Network layer attack and Transport layer
attack.
In physical layer the possible attacks are Primary User
Emulation (PUE), objective function attack and jam-
ming13
. First we confer about the PUE attack. he primary
user emulation attack is carried out by a malicious sec-
ondary user emulating a primary user or masquerading
as a primary user to obtain the resource of a given chan-
nel14
. Based on their motivations they are classiied into
two categories. hese are SELFISH PUE: Here, the goal of
the attacker is to increase its share of spectrum resources.
his attack is carried out between two attackers and estab-
lishes a dedicated link between the MALICIOUS PUE: In
malicious PUE, attackers try to prevent the legitimate sec-
ondary users from using the holes found in the spectrum.
he PUE attack can target both the types of cognitive radio
such as learning radios and policy radios15
. When dealing
with the policy radios, the efect of the attack vanishes
when the attackers leave the channel. hen the second-
ary users claim the channel thinking that the channel is
idle. On the other hand in learning radios, information
about the primary users current and the past behaviors
are gathered in order to know when the channel gets idle.
he attackers perform this attack when the channel gets
idle. here are various remedies to solve this PUE attack
one such therapy, and to focus on the cross layer pattern
recognition technique. his technique exploits the radio
signatures of each cognitive radio device. To overcome
this attack, waveform recognition is used to detect the
malevolent devices. he process involved in this pro-
posal are the enrollment in collecting data’s and testing in
order to determine the user his approach is a cross layer
security, which is capable of highlighting the peculiarity
among cognitive radio devices. It is also deined as one of
the perfect method to shield the PUE attack.
he second type of attack in the physical layer is
Objective function attack. In this attack Radio param-
eters are considered such as bandwidth, center frequency,
modulation type, power, encryption type, protocol,coding
rate, frame size, and channel access,. he cognitive engine
calculates these parameters to ind the radio param-
eters that can maximize the data rate and minimize the
power. When cognitive engine is running to calculate
these parameters, the attackers launch their hit. By means
of this hit, the particular attacker takes over the control
make results biased and tailored to his interest. Whenever
the cognitive engine tries to use the higher security level
the attackers commence the jamming attack on the radio
reducing the overall objective function. hen the cogni-
tive engine will refrain from increasing the security level
in order not to decrease the objective function. his attack
is afective only on on-line learning radios and has no
efect on of-line learning radios. here is no good solu-
tion to safe guard cognitive radio from this attack; rather
a simple suggestion is made to deine threshold values for
each radio parameters. If the parameters are not up to the
threshold level the communication stops. he third type
of attack over physical layer is jamming16,17
. In jamming
the attackers or jammer sends the packet continuously to
hamper the legitimate participants in a communication
session. his makes the legitimate user to never sense
the medium as idle, or the attacker sends the packets to
the legitimate user and forces them to receive the junk
packets. It also disrupts the communication by blasting a
radio transmission resulting in the corruption of packets
received by legal users. here exist four types of jammers
they are 1. Constant, 2. Deceptive, 3. Random, 4. Reactive.
Two strategies are used to defend against jamming.
he irst strategy is to escape the denial of service is chan-
nel suring, or frequency hopping. he second strategy is
spatial retreat where legitimate user changes their location
to escape their interference range imposed by the attacker.
In this approach essential point is to leave the region where
the attacker is present and the users must stay within the
range of each other to continue communication.
he attacks on LINK LAYER are Spectrum Sensing
Data Falsiication (SSDF), Control Channel Saturation
Dos attack (CCSD), Selish Channel Negotiation (SCN)18
.
In SSDF the attack occurs when an attacker sends false
local spectrum sensing results to its neighbors or to
the fusion center, causes the receiver to make a wrong
spectrum-sensing decision19
. his attack targets both
centralized and distributed CRNs. In a centralized CRN,
a fusion center is responsible for collecting all the sensed
data and then making a decision on which frequency
bands are occupied and which are set free. Fooling the
fusion center may lose some legitimate users. his type of
attack is defensive by calculating the threshold value. It is
calculated by inding the sum of the collected spectrum
that is sensed. If the sum is above or approx equal to the
Attacks in Cognitive Radio Networks (CNR) — A Survey
Indian Journal of Science and Technology
Vol 7 (4) | April 2014 | www.indjst.org
534
threshold value then the sensed efect says the medium is
full by saying that the incumbent signal is present, other-
wise the band is said to be free, i.e., it says the incumbent
signal is absent. Here, there is a possibility of miss detec-
tion. his can be overcome by increasing the threshold
value. Next attack we ind in link layer is Selish channel
negotiation. In multi hop cognitive radio network, a cog-
nitive radio can refuse to forward any data for other host.
his cause the conservation of energy and increase in
throughput. his attack degrades the end to end through-
put of the whole cognitive radio network. he sequential
probability ratio test can be used for this purpose in order
to prove its eiciency in terms of detection time21,22
.
he attacks found in the network layers are sinkhole
attack and HELLO lood attacks20
. In the Sinkhole attack
shows itself as a best route to a speciic destination, luring
neighboring nodes to use it to forward their packets. An
attacker can use this way to perform another attack called
selective forwarding, where he can modify or discard the
packets from any node in the network. his attack is efec-
tive in infrastructure and in a mesh architecture as all the
traic moves through the base station allows the attacker
to falsely claim as a best router for packet forwarding.
his attack is overcome by Geographic routing proto-
cols24
. Geographic protocols try to construct a topology
on demand using only local communication than rely-
ing on the base station. hus the traic will be routed to
the physical location of the base station and it is diicult
to go elsewhere to create a sinkhole. In HELLO lood
attack, the attack gets accomplished when an attacker
sends broadcast messages to all nodes in a network with a
enough power to convince them that it is their neighbor.
When this attack is detected there occurs a possibility of
packet loss, absence of neighbors to forward the packets.
his attack is defended by introducing a key called a sym-
metric key to share it with the trusted base station. he
Kerberos algorithm in cryptography is used to facilitate
the establishment of session keys between the diferent
parties in the network. To prevent an attacker from cre-
ating the session key is by limiting the shared keys. he
symmetric key is suggested because they are faster and
lower overhead on system resources.
In transport layer the possible attack is LION attacks23
.
In LION attack, it uses the primary user emulation attack
to disrupt transmission control protocol (tcp) connection.
It’s said to be a cross layer attack pointed at the transport
layer where imitating a licensed transmission will force a
crn to achieve a frequency handofs and thus degrading
tcp performance. he attacker intercepts the messages,
and it predicts to be in hand of when the frequency band
is tested and by claiming it using the PUE results in a total
network starvation.
5. Cognitive Radio along with
Spread Spectrum Modulation
Here, cognitive radio is secured by means of the spread
spectrum modulation. Cognitive utilizes the licensed
spectrum for transmission where, the security for such
spectrum is essential. Such, a secure communication is
made by the combinations of spread spectrum modula-
tion and encryption algorithms with the cognitive radio
technology. Cognitive radio is said to be an advancement
of SDR making the sensing and adaptation parameters
dynamic. Cognitive radio can be viewed as a collabora-
tive form of an application constitutes SDR and intelligent
signal processing also comprises the functional elements
of radio lexibility, spectral awareness and intelligent
decision making. Various encryption techniques are also
applied to secure the cognitive radios, the commonly
used techniques are symmetric encryption technique rec-
ognized as private key encryption algorithm. Commonly
used techniques are RSA, elliptic, SHA etc.
6. Securing Spectrum Sensing
in Multi-Channel
In this paper, the cornered attack is the byzantine attacks.
Byzantine attack includes coalition head and CR as their
attackers. hese attackers targets on reducing the channels
available and sense the multichannel cooperative spec-
trum sensing. he probability of these attacks is derived
and a new selection formula is formulated for the coali-
tion head. he probability of the change in local decision
for each cognitive radio becomes the Byzantine attacker
by which the probability of attack is derived. When the
Byzantine attackers continue their attack, contribution
of their related coalitions in the system decreases and
they get blocked out of the coalition. In considering the
distributed cooperative multichannel spectrum sensing,
attacks such as coalition head and multichannel byz-
antine attacks are introduced. he simulation is being
carried out to overcome the block attackers; the results
have concluded that the various counter attacks can be
used to mask the attackers from the coalition head. It also
S. Bhagavathy Nanthini, M. Hemalatha, D. Manivannan and L. Devasena
Indian Journal of Science and Technology 535
Vol 7 (4) | April 2014 | www.indjst.org
increases the number of the channels available when the
attackers are present.
7. Protocols for the Dynamic
Cognitive Radio Networks
he Spectrum Sensing, resource allocation and man-
agement is the issues largely focused by cognitive radio
networks. here are many existing protocols are intro-
duced as a challenge to the process of the CRN. he lack
of centralized authority makes the selish node incline
towards the self-centered behavior to maximize their
supports. Here, a cross-layer is proposed for avoiding
the selish performance in the routing protocols for the
dynamic cognitive radio network in preference to selish
nodes. Simulation results proposed that SAR provides
better performance, by means of higher throughput,
lower delay, and better delivery ratio. So, it can be said as
the cross layer selishness avoiding routing protocol.
8. Secure Communication based
on Digital Signature
Cognitive radio is a challenging concept to improve
the consumption of limited electromagnetic spectrum
resources for upcoming wireless communications. It is
essential to secure the cognitive radios to avoid inter-
ference. here may be various members join the CRN
or vacate the network any time. So there occurs a com-
pulsion to secure the network. his is done through the
digital signature. Here, there are two users utilizing the
cognitive radio. hey are primary user and secondary
user. Primary is of licensed user and secondary is of unli-
censed user who can use the medium cognitively without
causing injurious to the primary user. Here the primary
user identiication technique is used to secure the cogni-
tive. Various encryption techniques are used to safeguard
the cognitive networks.
9. Conclusion
his paper discusses about the threats found in the cogni-
tive radio networks, it is considered as one of the eicient
methods to make use of the available spectrum. he lack
of available spectrum, and increase in the applications
on wireless systems made the cognitive radio an adapt-
able method in the demanding wireless technology. he
discussion provided here gives a reliable measure to make
it as an analysis paper relating the possible threats and
their remedial methods.
10. References
1. El-Hajj W, Safa H, Guizani M. Survey of security issues in
cognitive radio networks. J Internet Tech. 2011; 12(2).
2. Mitola J III. Sotware radios – survey, critical evaluation
and future directions. IEEE Aero Electron Syst Mag. 1993
Apr; 8(4):25–36.
3. Tuttlebee W. Sotware deined radio: enabling technologies.
Chichester: Wiley; 2002.
4. Ulversøy T. Sotware deined radio: challenges and oppor-
tunities. IEEE Communications Surveys & Tutorials. 2010;
12(4):531–50.
5. Hsu C-S, Chen Y-S, He C-E. An eicient dynamic adjust-
ing MAC protocol for multichannel cognitive wireless
networks. 2010 IEEE International Conference on Wireless
Communications, Networking and Information Security
(WCNIS); 2010 Jun 25–27; Beijing, China. IEEE. p. 556–60.
6. LiuY, ZhaoZ,TangH.Radioresourcemanagementbetween
two user classes in cognitive radio communication. 2010
Second International Conference on Networks Security.
Wireless Communications and Trusted Computing. 2010
Apr 24–25; Wuhan, Hubei . IEEE. p. 215–18.
7. Tang L, Wu J. Research and analysis on cognitive radio net-
work security. Computer Science & Communications. 2012
Apr; 4(4):120–26.
8. Zhang Y, Xu GC, Geng XZ. Security threats in cogni-
tive radio networks. 10th IEEE International Conference
on High Performance Computing and Communications.
HPCC ‘08. 2008 Sep 25–27; Dalian. IEEE. p. 1–7.
9. Parvin S, Hussain FK. Digital signature-based secure com-
munication in cognitive radio networks. 2011 International
Conference on Broadband and Wireless Computing,
Communication and Applications (BWCCA). Barcelona.
IEEE. p. 9–12.
10. Zhao C, Xie L, Jiang X, Huang L, YaoA Y. PHY-layer
authentication approach for transmitter identiication in
cognitive radio networks. 2010 International Conference
on Communications and Mobile Computing (CMC). 2010
Ap 12–14; Shenzhen. IEEE. p. 154–58.
11. Wang H, Lightfoot L, Li T. On PHY-layer security of cog-
nitive radio:collaborative sensing under malicious attacks.
44th Annual Conference on Information Sciences and
Systems (CISS); 2010 Mar 217–19; Princeton, NJ. IEEE.
p. 66–73.
12. Sampath A, Dai H, Zheng H, Zhao BY. Multichannel jam-
ming attacks using cognitive radios. Proceedings of 16th
International Conference on Computer Communications
Attacks in Cognitive Radio Networks (CNR) — A Survey
Indian Journal of Science and Technology
Vol 7 (4) | April 2014 | www.indjst.org
536
and Networks. ICCCN 2007; 2007 Aug 13–16; Honolulu,
HI. IEEE. p. 352–57.
13. Chen R, Park J-M. Ensuring trustworthy spectrum sensing
in cognitive radio networks. SDR ‘06.1st IEEE Workshop
on Networking Technologies for Sotware Deined Radio
Networks; 2006 Sep 25; Reston, VA, USA. IEEE. p. 110–19.
14. Anand S, Jin Z, Subbalakshmi K. An Analytical model for
primary user emulation attacks in cognitive radio net-
works. 3rd IEEE Symposium on New Frontiers in Dynamic
Spectrum Access Networks. DySPAN; 2008 Oct; Chicago,
IL. IEEE. p. 3905–14.
15. Pei Y, Liang Y-C, Zhang L, he KC, Li KH. Secure commu-
nication over MISO cognitive radio channels. IEEE Trans
Wireless Comm. 2010; 9:1494–502.
16. Xu W, Trappe W, Zhang Y, Wood T. he feasibility of launch-
ing and detecting jamming attacks in wireless networks.
MobiHoc ‘05 Proceedings of the 6th ACM international
symposium on Mobile ad hoc networking and computing;
2005 May; Urbana, IL. p. 46–57.
17. Sampath A, Dai H, Zheng H, Zhao BY. Multi-channel jam-
ming attacks using cognitive radios, Proceedings of 16th
International Conference on Computer Communications
and Networks (ICCCN 2007). 2007 Aug 13–16; Honolulu,
HI. IEEE. p. 352–57.
18. Kaligineedi P, Khabbazian M, Bhargava VK. Secure cooper-
ative sensing techniques for cognitive radio systems. IEEE
International Conference on Communications (ICC ‘08).
2008 May. Beijing, China. IEEE. p. 3406–10.
19. Wang W, Li H, Sun Y, Han Z. Attack-proof collaborative
spectrum sensing in cognitive radio networks. 43rd Annual
Conference on Information Sciences and Systems (CISS
2009). 2009 Mar; Baltimore, MD. IEEE. p. 130–34.
20. Wang W, Sun Y, Li H, Han Z. Cross-layer attack and defense
in cognitive radio networks. 2010 Dec 6–10. Miami, FL.
IEEE. p. 1–6.
21. Zhu L, Zhou H. Two types of attacks against cognitive
radio network MAC protocols. International Conference
on Computer Science and Sotware Engineering; 2008 Dec;
Wuhan, China. IEEE. p.1110–13.
22. Bian K, Park J-M. MAC-layer misbehaviors in multi-hop
cognitive radio networks. US-Korea Conference on Science,
Technology, and Entrepreneurship (UKC2006); 2006 Aug.
23. Hernandez-Serrano J, León O, Soriano M. Modeling the
Lion Attack in Cognitive Radio Networks. EURASIP
Journal on Wireless Communications and Networking.
2011; 10:242–304.
24. Hu Y-C, Johnson DB, Perrig A. SEAD: secure eicient dis-
tance vector routing for mobile wireless ad hoc networks.
Proceedings of the Fourth IEEE Workshop on Mobile
Computing Systems and Applications (WMCSA’02);
2002 Jun; Callicoon, NY.

More Related Content

Similar to Attacks in Cognitive Radio Networks (CRN) A Survey.pdf

AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
 
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A SurveySecure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIOijngnjournal
 
A survey on security threats and detection2013
A survey on security threats and detection2013A survey on security threats and detection2013
A survey on security threats and detection2013Amina RIYAHI
 
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...Raja Larik
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docIIRindia
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radioNavya Shree
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksAlexander Decker
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...IJERA Editor
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksTELKOMNIKA JOURNAL
 

Similar to Attacks in Cognitive Radio Networks (CRN) A Survey.pdf (20)

AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
 
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A SurveySecure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIO
 
A survey on security threats and detection2013
A survey on security threats and detection2013A survey on security threats and detection2013
A survey on security threats and detection2013
 
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radio
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...
 
Science journal
Science journalScience journal
Science journal
 
Brain empowered
Brain empoweredBrain empowered
Brain empowered
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio Networks
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 

More from Yolanda Ivey

How Can I Write About Myself. Write My Essay Or
How Can I Write About Myself. Write My Essay OrHow Can I Write About Myself. Write My Essay Or
How Can I Write About Myself. Write My Essay OrYolanda Ivey
 
Do My Essay For Cheap Uk - Can So
Do My Essay For Cheap Uk - Can SoDo My Essay For Cheap Uk - Can So
Do My Essay For Cheap Uk - Can SoYolanda Ivey
 
Soal Essay Sistem Inventory Beinyu.Com
Soal Essay Sistem Inventory Beinyu.ComSoal Essay Sistem Inventory Beinyu.Com
Soal Essay Sistem Inventory Beinyu.ComYolanda Ivey
 
Petra Van Der Merwe Champion Of IOCD Essay Competition
Petra Van Der Merwe Champion Of IOCD Essay CompetitionPetra Van Der Merwe Champion Of IOCD Essay Competition
Petra Van Der Merwe Champion Of IOCD Essay CompetitionYolanda Ivey
 
Premium Writing Paper Sets - Honeytree Person
Premium Writing Paper Sets - Honeytree PersonPremium Writing Paper Sets - Honeytree Person
Premium Writing Paper Sets - Honeytree PersonYolanda Ivey
 
PPT - How To Write A Perfect Persuasive Essay Conclusi
PPT - How To Write A Perfect Persuasive Essay ConclusiPPT - How To Write A Perfect Persuasive Essay Conclusi
PPT - How To Write A Perfect Persuasive Essay ConclusiYolanda Ivey
 
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...Yolanda Ivey
 
College Of Charleston Highly Ranked By U.S. News World Report
College Of Charleston Highly Ranked By U.S. News  World ReportCollege Of Charleston Highly Ranked By U.S. News  World Report
College Of Charleston Highly Ranked By U.S. News World ReportYolanda Ivey
 
Strathmore 400 Series Calligraphy Writing Paper
Strathmore 400 Series Calligraphy Writing PaperStrathmore 400 Series Calligraphy Writing Paper
Strathmore 400 Series Calligraphy Writing PaperYolanda Ivey
 
Sample Case Study Paper - Example Of Case Study R
Sample Case Study Paper - Example Of Case Study RSample Case Study Paper - Example Of Case Study R
Sample Case Study Paper - Example Of Case Study RYolanda Ivey
 
Pay Someone To Write Your Research Paper. Write
Pay Someone To Write Your Research Paper. WritePay Someone To Write Your Research Paper. Write
Pay Someone To Write Your Research Paper. WriteYolanda Ivey
 
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...Yolanda Ivey
 
Lined Writing Paper For Kids
Lined Writing Paper For KidsLined Writing Paper For Kids
Lined Writing Paper For KidsYolanda Ivey
 
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......Yolanda Ivey
 
ABE fermentation products recovery methods A review.pdf
ABE fermentation products recovery methods A review.pdfABE fermentation products recovery methods A review.pdf
ABE fermentation products recovery methods A review.pdfYolanda Ivey
 
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdfAN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdfYolanda Ivey
 
Age, equality, and cultural oppression An argument against ageism.pdf
Age, equality, and cultural oppression  An argument against ageism.pdfAge, equality, and cultural oppression  An argument against ageism.pdf
Age, equality, and cultural oppression An argument against ageism.pdfYolanda Ivey
 
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...Yolanda Ivey
 
Anthropology A Global Perspective Ninth Edition.pdf
Anthropology A Global Perspective Ninth Edition.pdfAnthropology A Global Perspective Ninth Edition.pdf
Anthropology A Global Perspective Ninth Edition.pdfYolanda Ivey
 
79 Short Essays on Design.pdf
79 Short Essays on Design.pdf79 Short Essays on Design.pdf
79 Short Essays on Design.pdfYolanda Ivey
 

More from Yolanda Ivey (20)

How Can I Write About Myself. Write My Essay Or
How Can I Write About Myself. Write My Essay OrHow Can I Write About Myself. Write My Essay Or
How Can I Write About Myself. Write My Essay Or
 
Do My Essay For Cheap Uk - Can So
Do My Essay For Cheap Uk - Can SoDo My Essay For Cheap Uk - Can So
Do My Essay For Cheap Uk - Can So
 
Soal Essay Sistem Inventory Beinyu.Com
Soal Essay Sistem Inventory Beinyu.ComSoal Essay Sistem Inventory Beinyu.Com
Soal Essay Sistem Inventory Beinyu.Com
 
Petra Van Der Merwe Champion Of IOCD Essay Competition
Petra Van Der Merwe Champion Of IOCD Essay CompetitionPetra Van Der Merwe Champion Of IOCD Essay Competition
Petra Van Der Merwe Champion Of IOCD Essay Competition
 
Premium Writing Paper Sets - Honeytree Person
Premium Writing Paper Sets - Honeytree PersonPremium Writing Paper Sets - Honeytree Person
Premium Writing Paper Sets - Honeytree Person
 
PPT - How To Write A Perfect Persuasive Essay Conclusi
PPT - How To Write A Perfect Persuasive Essay ConclusiPPT - How To Write A Perfect Persuasive Essay Conclusi
PPT - How To Write A Perfect Persuasive Essay Conclusi
 
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
 
College Of Charleston Highly Ranked By U.S. News World Report
College Of Charleston Highly Ranked By U.S. News  World ReportCollege Of Charleston Highly Ranked By U.S. News  World Report
College Of Charleston Highly Ranked By U.S. News World Report
 
Strathmore 400 Series Calligraphy Writing Paper
Strathmore 400 Series Calligraphy Writing PaperStrathmore 400 Series Calligraphy Writing Paper
Strathmore 400 Series Calligraphy Writing Paper
 
Sample Case Study Paper - Example Of Case Study R
Sample Case Study Paper - Example Of Case Study RSample Case Study Paper - Example Of Case Study R
Sample Case Study Paper - Example Of Case Study R
 
Pay Someone To Write Your Research Paper. Write
Pay Someone To Write Your Research Paper. WritePay Someone To Write Your Research Paper. Write
Pay Someone To Write Your Research Paper. Write
 
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
 
Lined Writing Paper For Kids
Lined Writing Paper For KidsLined Writing Paper For Kids
Lined Writing Paper For Kids
 
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
 
ABE fermentation products recovery methods A review.pdf
ABE fermentation products recovery methods A review.pdfABE fermentation products recovery methods A review.pdf
ABE fermentation products recovery methods A review.pdf
 
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdfAN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
 
Age, equality, and cultural oppression An argument against ageism.pdf
Age, equality, and cultural oppression  An argument against ageism.pdfAge, equality, and cultural oppression  An argument against ageism.pdf
Age, equality, and cultural oppression An argument against ageism.pdf
 
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
 
Anthropology A Global Perspective Ninth Edition.pdf
Anthropology A Global Perspective Ninth Edition.pdfAnthropology A Global Perspective Ninth Edition.pdf
Anthropology A Global Perspective Ninth Edition.pdf
 
79 Short Essays on Design.pdf
79 Short Essays on Design.pdf79 Short Essays on Design.pdf
79 Short Essays on Design.pdf
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Attacks in Cognitive Radio Networks (CRN) A Survey.pdf

  • 1. Attacks in Cognitive Radio Networks (CRN) — A Survey S. Bhagavathy Nanthini1 * , M. Hemalatha1 , D. Manivannan1 and L. Devasena 2 1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu-613401, India; nanthubha@gmail.com, hemalatha@it.sastra.edu, dmv@cse.sastra.edu 2 School of EEE, SASTRA University, Thanjavur, Tamil Nadu-613401, India; devasena@eie.sastra.edu Abstract As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services and their application leads to the spectrum scarcity. In order to utilize the available spectrum efficiently, “cognitive radio”- The demanding technology is introduced. It is a dynamic technology that can sense the medium, utilizes the available white spaces, for transmission by detecting its neighboring devices. The cognitive radio targets to increase the efficiency of the spectrum changes without causing any intervention to the licensed users. Since cognitive radio works in the open network space, it increases the chance of the attacker to show intervene on the spectral medium. So, the security becomes the key factor. This leads to the realization of various security threats in the cognitive radio. There are various papers covering the security issues over the threats in cognitive radio, but this paper provides an advanced survey over attacks and com- mon threats and the possibility of securing the available spectrum from the attackers. In addition to that future scope and challenges are also addressed. This survey will help the researchers to identify the space left out and the problems to be attached related to security issues on cognitive radio. *Author for correspondence 1. Introduction For the past decade wireless technology shows a dras- tic improvement in its technological and its application aspects. his increases the number of available wireless users. hese wireless users greatly rely on the available radio spectrum, which leads to a scarcity in the available spectrum. he Federal Communications Commission (FCC) insists that certain portions of the RF spectrum are made available for public use, which is vacant1 . hese vacant spaces termed as White space devices comprised with technologies to prevent interference, Technologies constitutes spectrum sensing and geo-location capabili- ties. Based on this a new promising technology called cognitive radio is implemented. Mitola developed the design of cognitive radio2 at the defense advanced project research agency in U.S.A. Indian Journal of Science and Technology, Vol 7(4), 530–536, April 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Keywords: Attacks, Digital Signatures, Cognitive-radio, Security, Spread Spectrum Modulation Cognitive radio is deined as a sotware deined radio3,4 in wireless communication, that sense the environment and detect the free space amongst the crowded channel, and utilize the vacant space eiciently. It can also work on the available channel as a secondary user paving way for both the user without any interference6 . It is also deined as a transceiver which has the ability to ind the avail- able communication channel in the wireless spectrum and perform transmission and reception characteristics according to the available channel. While two users rely on the particular channel there is a possibility of causing interferences and also there occurs a wide chance for the attackers to interfere the particular channel. In order to avoid those possibilities, we are securing cognitive radio in diferent methods7,8 . his paper focuses on the analysis of security issues in various perspectives on the cognitive radio networks.
  • 2. S. Bhagavathy Nanthini, M. Hemalatha, D. Manivannan and L. Devasena Indian Journal of Science and Technology 531 Vol 7 (4) | April 2014 | www.indjst.org Vol 7 (4) | April 2014 | www.indjst.org First view says the various methods of securing cognitive radios relying over each layer, which is named as layered attacks. his layered attack can be classiied based on the various layers in the ISO / OSI model. Attacks falling under physical layer is said to be a physical layer attack, which rely on link layer is said to be MAC layer attacks, and over the network layer is said to be network layer attacks, and on transport layer is said to be transport layer attacks. Based on the attacks, threats are detected and the security measures are taken. Second view conveys the method of securing the spectrum channel by combining the cognitive radio with the spread spectrum modula- tions9 . By using this method the unique characteristics of the cognitive radio provide a protected and consistent communication over the given medium. Here, the spread spectrum modulations are combined with the encryption technique so that it is possible to secure as well as it can have the potential to switch over to the various frequency bands. According to the third view, the CRN is secured by means of Digital signature9 . Here, eicient Primary User Identiication (PUI) from public key cryptography is used to secure the communication made through the channel. Using this method, the interruption caused by the other unauthorized users can be avoided. he digital signature method which uses the public key cryptography is an efective method and is easily implementable since its light weighted one and key management is simple. Attackers launch their attack on each layer, but most commonly they target on the lower level layer i.e. physi- cal layer. When comparing the physical layer to the other corresponding layers the security over the higher layers is done through various higher layer authentication and encryption methods. Here, they focus on securing cogni- tive radio from the lowest layer i.e., physical layer, since the CR relies heavily on PHY layer spectrum sensing leaving the system vulnerable to physical layer attacks10,11 . his physical layer is secured by means of location speciic information’s by locating the inger prints. By promot- ing PUE attack the extraction of transmitter ingerprints is made multipath fading propagation environment. Wavelett transformations detect the transmitter inger prints and analyze them. Another way of securing the cognitive radio is by means of generating a random number with the help of various algorithms. Here, all the algorithms that are used to generate random number is compared and the one superior algorithm is detected for securing the CR, One such focused algorithm is ULSI. In this paper Section 1 covers the methods of secur- ing layered attacks in cognitive radio. Section2 deals with securing cognitive radio by the spread spectrum modula- tion techniques. Section3 points on the speciic layer and the process of securing it. Section 4 discuss about secur- ing by means of digital signature method. 2. Cognitive Radio Networks Now a day, on the whole communication process totally depends on the wireless medium. Technological improve- ment reaches the peak level, and their user’s gets increase in the higher rate. he wireless technology greatly depends on the radio frequency spectrum, whereas the available spectrum is low when compared to their utilization. hus the efective utilization of these spectra becomes a neces- sity, and so the cognitive radio becomes the promising technology. he cognitive radio is termed as the sotware deined radio technology that avails the license to the unlicensed users without any inference. It also considered as a model for wireless technol- ogy which takes an intelligent decision by changing its transmission or reception parameters based on the neighboring networks without providing any interference to other users. he cognitive radio network architecture can be broadly divided into two clusters: primary network also named as licensed users in the existing networks. he other is cognitive radio networks otherwise called as unli- censed users. Figure 1 shows the architecture of the cognitive radio, where the lower most layer is the physical layer. Next to that there is link layer, network layer and transport layer. Each layer performs diferent functions which are explained in detail. Physical layer performs three functions they are, Spectrum sensing, Channel estimation and Data trans- mission. Spectrum sensing becomes the much needed task when compared to other two functions. As the name implies, the task of spectrum sensing is to sense the avail- able free medium for an efective transmission, also to avoid the occurrence of any interference to potential primary users in their vicinity. hen comes the channel estimation, before setting up the link, the quality of the sub channels is estimated based on their transmission parameters such as transmit power, bit rate and coding. In data transmission, ater assigning the spectrum by means of spectrum sensing and channel estimation, the trans- mission of data takes place. It should have the capability
  • 3. Attacks in Cognitive Radio Networks (CNR) — A Survey Indian Journal of Science and Technology Vol 7 (4) | April 2014 | www.indjst.org 532 to operate at variable symbol rates, diferent channel cod- ing schemes, power levels, and capable of using multiple antennas to nullify the interference. he functions of the link layers are group manage- ment, link management, and medium access control. In group management, there will be number of secondary user groups, where the arriving user can join any of the existing groups or form a new one through a universal control channel. Link management covers the set up on the link to enable the communication between any two secondary users and also maintain the link until the duration of the communication. Medium access control controls the sub channels. If any of the sub channels is used by the particular secondary users, then the particu- lar channel cannot be used by any other secondary users. Whereas the network layers and transport layers known as the higher layer is used for the transferring of the data allocating the particular network. he characteristics over the cognitive radio are Cognitive capability, Re-conigurability. Cognitive capa- bility makes the device to sense the environment and to choose the best available spectrum for transmission. his becomes possible through the spectrum management process. Re conigurability enables the device to make it adapt to its environment by modifying its parameters such as frequency, modulation etc. here are three dif- ferent mechanisms in cognitive cycle to analyze the best spectrum in the available environment. hey are given by Spectrum sensing in which is used to sense the available spectrum and chooses the best possible one, Spectrum analysis is based on the information over the available spectrum holes and analyzes the network and channel characteristics for each spectrum hole, Spectrum decision decides the appropriate spectrum hole for transmission. 3. Need for Security in CRN Cognitive radio has the capability of adapting to the environment and make changes based on their com- munication capabilities for the secure communication. Comparing the wired network and the wireless network, the security is susceptible in case of wireless network. When the data are sent via a wireless network, then there is a possibility of eavesdropped, or can be altered, jam- ming may take place. he cognitive radio networks have a unique characteristic that security becomes essential over it. his paper has summarized various possibilities of attacks over it, and the security issues to be taken to overcome those attacks in CRN. 4. Attacks Over the Layers and its Detection he best capability of the cognitive radio network is to take advantage over the available vacant spaces in a spectrum. A study done at Berkeley Wireless Research Center (BWRC) says the frequency ranging from 1GHz to 10 GHz is underutilized. hese nodes can sense the Figure 1. Architecture of cognitive Radio
  • 4. S. Bhagavathy Nanthini, M. Hemalatha, D. Manivannan and L. Devasena Indian Journal of Science and Technology 533 Vol 7 (4) | April 2014 | www.indjst.org environment and utilize the free spectrum. he challenges over the Cognitive radio are transparency to primary users and non-interference. So there occurs an increase in the possibility for the attackers. he attacks over each layer are analyzed by four major classes based on the layer where the attack falls: Physical layer attack, Data Link layer attack, Network layer attack and Transport layer attack. In physical layer the possible attacks are Primary User Emulation (PUE), objective function attack and jam- ming13 . First we confer about the PUE attack. he primary user emulation attack is carried out by a malicious sec- ondary user emulating a primary user or masquerading as a primary user to obtain the resource of a given chan- nel14 . Based on their motivations they are classiied into two categories. hese are SELFISH PUE: Here, the goal of the attacker is to increase its share of spectrum resources. his attack is carried out between two attackers and estab- lishes a dedicated link between the MALICIOUS PUE: In malicious PUE, attackers try to prevent the legitimate sec- ondary users from using the holes found in the spectrum. he PUE attack can target both the types of cognitive radio such as learning radios and policy radios15 . When dealing with the policy radios, the efect of the attack vanishes when the attackers leave the channel. hen the second- ary users claim the channel thinking that the channel is idle. On the other hand in learning radios, information about the primary users current and the past behaviors are gathered in order to know when the channel gets idle. he attackers perform this attack when the channel gets idle. here are various remedies to solve this PUE attack one such therapy, and to focus on the cross layer pattern recognition technique. his technique exploits the radio signatures of each cognitive radio device. To overcome this attack, waveform recognition is used to detect the malevolent devices. he process involved in this pro- posal are the enrollment in collecting data’s and testing in order to determine the user his approach is a cross layer security, which is capable of highlighting the peculiarity among cognitive radio devices. It is also deined as one of the perfect method to shield the PUE attack. he second type of attack in the physical layer is Objective function attack. In this attack Radio param- eters are considered such as bandwidth, center frequency, modulation type, power, encryption type, protocol,coding rate, frame size, and channel access,. he cognitive engine calculates these parameters to ind the radio param- eters that can maximize the data rate and minimize the power. When cognitive engine is running to calculate these parameters, the attackers launch their hit. By means of this hit, the particular attacker takes over the control make results biased and tailored to his interest. Whenever the cognitive engine tries to use the higher security level the attackers commence the jamming attack on the radio reducing the overall objective function. hen the cogni- tive engine will refrain from increasing the security level in order not to decrease the objective function. his attack is afective only on on-line learning radios and has no efect on of-line learning radios. here is no good solu- tion to safe guard cognitive radio from this attack; rather a simple suggestion is made to deine threshold values for each radio parameters. If the parameters are not up to the threshold level the communication stops. he third type of attack over physical layer is jamming16,17 . In jamming the attackers or jammer sends the packet continuously to hamper the legitimate participants in a communication session. his makes the legitimate user to never sense the medium as idle, or the attacker sends the packets to the legitimate user and forces them to receive the junk packets. It also disrupts the communication by blasting a radio transmission resulting in the corruption of packets received by legal users. here exist four types of jammers they are 1. Constant, 2. Deceptive, 3. Random, 4. Reactive. Two strategies are used to defend against jamming. he irst strategy is to escape the denial of service is chan- nel suring, or frequency hopping. he second strategy is spatial retreat where legitimate user changes their location to escape their interference range imposed by the attacker. In this approach essential point is to leave the region where the attacker is present and the users must stay within the range of each other to continue communication. he attacks on LINK LAYER are Spectrum Sensing Data Falsiication (SSDF), Control Channel Saturation Dos attack (CCSD), Selish Channel Negotiation (SCN)18 . In SSDF the attack occurs when an attacker sends false local spectrum sensing results to its neighbors or to the fusion center, causes the receiver to make a wrong spectrum-sensing decision19 . his attack targets both centralized and distributed CRNs. In a centralized CRN, a fusion center is responsible for collecting all the sensed data and then making a decision on which frequency bands are occupied and which are set free. Fooling the fusion center may lose some legitimate users. his type of attack is defensive by calculating the threshold value. It is calculated by inding the sum of the collected spectrum that is sensed. If the sum is above or approx equal to the
  • 5. Attacks in Cognitive Radio Networks (CNR) — A Survey Indian Journal of Science and Technology Vol 7 (4) | April 2014 | www.indjst.org 534 threshold value then the sensed efect says the medium is full by saying that the incumbent signal is present, other- wise the band is said to be free, i.e., it says the incumbent signal is absent. Here, there is a possibility of miss detec- tion. his can be overcome by increasing the threshold value. Next attack we ind in link layer is Selish channel negotiation. In multi hop cognitive radio network, a cog- nitive radio can refuse to forward any data for other host. his cause the conservation of energy and increase in throughput. his attack degrades the end to end through- put of the whole cognitive radio network. he sequential probability ratio test can be used for this purpose in order to prove its eiciency in terms of detection time21,22 . he attacks found in the network layers are sinkhole attack and HELLO lood attacks20 . In the Sinkhole attack shows itself as a best route to a speciic destination, luring neighboring nodes to use it to forward their packets. An attacker can use this way to perform another attack called selective forwarding, where he can modify or discard the packets from any node in the network. his attack is efec- tive in infrastructure and in a mesh architecture as all the traic moves through the base station allows the attacker to falsely claim as a best router for packet forwarding. his attack is overcome by Geographic routing proto- cols24 . Geographic protocols try to construct a topology on demand using only local communication than rely- ing on the base station. hus the traic will be routed to the physical location of the base station and it is diicult to go elsewhere to create a sinkhole. In HELLO lood attack, the attack gets accomplished when an attacker sends broadcast messages to all nodes in a network with a enough power to convince them that it is their neighbor. When this attack is detected there occurs a possibility of packet loss, absence of neighbors to forward the packets. his attack is defended by introducing a key called a sym- metric key to share it with the trusted base station. he Kerberos algorithm in cryptography is used to facilitate the establishment of session keys between the diferent parties in the network. To prevent an attacker from cre- ating the session key is by limiting the shared keys. he symmetric key is suggested because they are faster and lower overhead on system resources. In transport layer the possible attack is LION attacks23 . In LION attack, it uses the primary user emulation attack to disrupt transmission control protocol (tcp) connection. It’s said to be a cross layer attack pointed at the transport layer where imitating a licensed transmission will force a crn to achieve a frequency handofs and thus degrading tcp performance. he attacker intercepts the messages, and it predicts to be in hand of when the frequency band is tested and by claiming it using the PUE results in a total network starvation. 5. Cognitive Radio along with Spread Spectrum Modulation Here, cognitive radio is secured by means of the spread spectrum modulation. Cognitive utilizes the licensed spectrum for transmission where, the security for such spectrum is essential. Such, a secure communication is made by the combinations of spread spectrum modula- tion and encryption algorithms with the cognitive radio technology. Cognitive radio is said to be an advancement of SDR making the sensing and adaptation parameters dynamic. Cognitive radio can be viewed as a collabora- tive form of an application constitutes SDR and intelligent signal processing also comprises the functional elements of radio lexibility, spectral awareness and intelligent decision making. Various encryption techniques are also applied to secure the cognitive radios, the commonly used techniques are symmetric encryption technique rec- ognized as private key encryption algorithm. Commonly used techniques are RSA, elliptic, SHA etc. 6. Securing Spectrum Sensing in Multi-Channel In this paper, the cornered attack is the byzantine attacks. Byzantine attack includes coalition head and CR as their attackers. hese attackers targets on reducing the channels available and sense the multichannel cooperative spec- trum sensing. he probability of these attacks is derived and a new selection formula is formulated for the coali- tion head. he probability of the change in local decision for each cognitive radio becomes the Byzantine attacker by which the probability of attack is derived. When the Byzantine attackers continue their attack, contribution of their related coalitions in the system decreases and they get blocked out of the coalition. In considering the distributed cooperative multichannel spectrum sensing, attacks such as coalition head and multichannel byz- antine attacks are introduced. he simulation is being carried out to overcome the block attackers; the results have concluded that the various counter attacks can be used to mask the attackers from the coalition head. It also
  • 6. S. Bhagavathy Nanthini, M. Hemalatha, D. Manivannan and L. Devasena Indian Journal of Science and Technology 535 Vol 7 (4) | April 2014 | www.indjst.org increases the number of the channels available when the attackers are present. 7. Protocols for the Dynamic Cognitive Radio Networks he Spectrum Sensing, resource allocation and man- agement is the issues largely focused by cognitive radio networks. here are many existing protocols are intro- duced as a challenge to the process of the CRN. he lack of centralized authority makes the selish node incline towards the self-centered behavior to maximize their supports. Here, a cross-layer is proposed for avoiding the selish performance in the routing protocols for the dynamic cognitive radio network in preference to selish nodes. Simulation results proposed that SAR provides better performance, by means of higher throughput, lower delay, and better delivery ratio. So, it can be said as the cross layer selishness avoiding routing protocol. 8. Secure Communication based on Digital Signature Cognitive radio is a challenging concept to improve the consumption of limited electromagnetic spectrum resources for upcoming wireless communications. It is essential to secure the cognitive radios to avoid inter- ference. here may be various members join the CRN or vacate the network any time. So there occurs a com- pulsion to secure the network. his is done through the digital signature. Here, there are two users utilizing the cognitive radio. hey are primary user and secondary user. Primary is of licensed user and secondary is of unli- censed user who can use the medium cognitively without causing injurious to the primary user. Here the primary user identiication technique is used to secure the cogni- tive. Various encryption techniques are used to safeguard the cognitive networks. 9. Conclusion his paper discusses about the threats found in the cogni- tive radio networks, it is considered as one of the eicient methods to make use of the available spectrum. he lack of available spectrum, and increase in the applications on wireless systems made the cognitive radio an adapt- able method in the demanding wireless technology. he discussion provided here gives a reliable measure to make it as an analysis paper relating the possible threats and their remedial methods. 10. References 1. El-Hajj W, Safa H, Guizani M. Survey of security issues in cognitive radio networks. J Internet Tech. 2011; 12(2). 2. Mitola J III. Sotware radios – survey, critical evaluation and future directions. IEEE Aero Electron Syst Mag. 1993 Apr; 8(4):25–36. 3. Tuttlebee W. Sotware deined radio: enabling technologies. Chichester: Wiley; 2002. 4. Ulversøy T. Sotware deined radio: challenges and oppor- tunities. IEEE Communications Surveys & Tutorials. 2010; 12(4):531–50. 5. Hsu C-S, Chen Y-S, He C-E. An eicient dynamic adjust- ing MAC protocol for multichannel cognitive wireless networks. 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS); 2010 Jun 25–27; Beijing, China. IEEE. p. 556–60. 6. LiuY, ZhaoZ,TangH.Radioresourcemanagementbetween two user classes in cognitive radio communication. 2010 Second International Conference on Networks Security. Wireless Communications and Trusted Computing. 2010 Apr 24–25; Wuhan, Hubei . IEEE. p. 215–18. 7. Tang L, Wu J. Research and analysis on cognitive radio net- work security. Computer Science & Communications. 2012 Apr; 4(4):120–26. 8. Zhang Y, Xu GC, Geng XZ. Security threats in cogni- tive radio networks. 10th IEEE International Conference on High Performance Computing and Communications. HPCC ‘08. 2008 Sep 25–27; Dalian. IEEE. p. 1–7. 9. Parvin S, Hussain FK. Digital signature-based secure com- munication in cognitive radio networks. 2011 International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA). Barcelona. IEEE. p. 9–12. 10. Zhao C, Xie L, Jiang X, Huang L, YaoA Y. PHY-layer authentication approach for transmitter identiication in cognitive radio networks. 2010 International Conference on Communications and Mobile Computing (CMC). 2010 Ap 12–14; Shenzhen. IEEE. p. 154–58. 11. Wang H, Lightfoot L, Li T. On PHY-layer security of cog- nitive radio:collaborative sensing under malicious attacks. 44th Annual Conference on Information Sciences and Systems (CISS); 2010 Mar 217–19; Princeton, NJ. IEEE. p. 66–73. 12. Sampath A, Dai H, Zheng H, Zhao BY. Multichannel jam- ming attacks using cognitive radios. Proceedings of 16th International Conference on Computer Communications
  • 7. Attacks in Cognitive Radio Networks (CNR) — A Survey Indian Journal of Science and Technology Vol 7 (4) | April 2014 | www.indjst.org 536 and Networks. ICCCN 2007; 2007 Aug 13–16; Honolulu, HI. IEEE. p. 352–57. 13. Chen R, Park J-M. Ensuring trustworthy spectrum sensing in cognitive radio networks. SDR ‘06.1st IEEE Workshop on Networking Technologies for Sotware Deined Radio Networks; 2006 Sep 25; Reston, VA, USA. IEEE. p. 110–19. 14. Anand S, Jin Z, Subbalakshmi K. An Analytical model for primary user emulation attacks in cognitive radio net- works. 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks. DySPAN; 2008 Oct; Chicago, IL. IEEE. p. 3905–14. 15. Pei Y, Liang Y-C, Zhang L, he KC, Li KH. Secure commu- nication over MISO cognitive radio channels. IEEE Trans Wireless Comm. 2010; 9:1494–502. 16. Xu W, Trappe W, Zhang Y, Wood T. he feasibility of launch- ing and detecting jamming attacks in wireless networks. MobiHoc ‘05 Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing; 2005 May; Urbana, IL. p. 46–57. 17. Sampath A, Dai H, Zheng H, Zhao BY. Multi-channel jam- ming attacks using cognitive radios, Proceedings of 16th International Conference on Computer Communications and Networks (ICCCN 2007). 2007 Aug 13–16; Honolulu, HI. IEEE. p. 352–57. 18. Kaligineedi P, Khabbazian M, Bhargava VK. Secure cooper- ative sensing techniques for cognitive radio systems. IEEE International Conference on Communications (ICC ‘08). 2008 May. Beijing, China. IEEE. p. 3406–10. 19. Wang W, Li H, Sun Y, Han Z. Attack-proof collaborative spectrum sensing in cognitive radio networks. 43rd Annual Conference on Information Sciences and Systems (CISS 2009). 2009 Mar; Baltimore, MD. IEEE. p. 130–34. 20. Wang W, Sun Y, Li H, Han Z. Cross-layer attack and defense in cognitive radio networks. 2010 Dec 6–10. Miami, FL. IEEE. p. 1–6. 21. Zhu L, Zhou H. Two types of attacks against cognitive radio network MAC protocols. International Conference on Computer Science and Sotware Engineering; 2008 Dec; Wuhan, China. IEEE. p.1110–13. 22. Bian K, Park J-M. MAC-layer misbehaviors in multi-hop cognitive radio networks. US-Korea Conference on Science, Technology, and Entrepreneurship (UKC2006); 2006 Aug. 23. Hernandez-Serrano J, León O, Soriano M. Modeling the Lion Attack in Cognitive Radio Networks. EURASIP Journal on Wireless Communications and Networking. 2011; 10:242–304. 24. Hu Y-C, Johnson DB, Perrig A. SEAD: secure eicient dis- tance vector routing for mobile wireless ad hoc networks. Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02); 2002 Jun; Callicoon, NY.