This document provides a survey of attacks in cognitive radio networks. It discusses several types of attacks that can occur at different layers of the cognitive radio network architecture. At the physical layer, common attacks include primary user emulation attacks, objective function attacks, and jamming. At the data link layer, attacks include spectrum sensing data falsification, control channel saturation denial of service attacks, and selfish channel negotiation. The document surveys existing research on these attacks and discusses potential methods for securing cognitive radio networks, such as using digital signatures, spread spectrum modulation, or fingerprinting techniques. It aims to help researchers identify security issues and problems that need to be addressed to better secure cognitive radio networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A cognitive radio and dynamic spectrum access – a studyijngnjournal
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the
demand of future services. While all of the radio spectrum is allocated to different services, applications
and users, observation show that usage of the spectrum is actually quite low. To overcome this problem
and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication,
in which a transmitter and receiver can detect intelligently communication channels that are in use and
those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes
possible the use of available radio frequency spectrum while minimizing interference with other users. CRs
must have the capability to learn and adapt their wireless transmission according to the surrounding radio
environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising
since they have a great importance for the implementation of Cognitive Radio networks architecture.
Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless
communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to
the actual licensees. This paper is a review and comparison of different DSA models and methods.
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the demand of future services. While all of the radio spectrum is allocated to different services, applications and users, observation show that usage of the spectrum is actually quite low. To overcome this problem and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication, in which a transmitter and receiver can detect intelligently communication channels that are in use and those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes possible the use of available radio frequency spectrum while minimizing interference with other users. CRs must have the capability to learn and adapt their wireless transmission according to the surrounding radio environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising since they have a great importance for the implementation of Cognitive Radio networks architecture. Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to the actual licensees. This paper is a review and comparison of different DSA models and methods.
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
Abstract A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra-dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys-tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man-agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework which will support the secondary user data transmission while considering the primary user activity and QoS requirement. Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A cognitive radio and dynamic spectrum access – a studyijngnjournal
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the
demand of future services. While all of the radio spectrum is allocated to different services, applications
and users, observation show that usage of the spectrum is actually quite low. To overcome this problem
and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication,
in which a transmitter and receiver can detect intelligently communication channels that are in use and
those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes
possible the use of available radio frequency spectrum while minimizing interference with other users. CRs
must have the capability to learn and adapt their wireless transmission according to the surrounding radio
environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising
since they have a great importance for the implementation of Cognitive Radio networks architecture.
Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless
communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to
the actual licensees. This paper is a review and comparison of different DSA models and methods.
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the demand of future services. While all of the radio spectrum is allocated to different services, applications and users, observation show that usage of the spectrum is actually quite low. To overcome this problem and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication, in which a transmitter and receiver can detect intelligently communication channels that are in use and those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes possible the use of available radio frequency spectrum while minimizing interference with other users. CRs must have the capability to learn and adapt their wireless transmission according to the surrounding radio environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising since they have a great importance for the implementation of Cognitive Radio networks architecture. Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to the actual licensees. This paper is a review and comparison of different DSA models and methods.
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
Abstract A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra-dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys-tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man-agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework which will support the secondary user data transmission while considering the primary user activity and QoS requirement. Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio Networks (CRNs) is a recently emerging paradigm that aim to opportunistically access the intermittent periods of unoccupied frequency bands and therefore increasing the spectral efficiency. Unlike conventional radios, cognitive radios can intelligently adjust their transmission/reception parameters based on the interaction with the environment and find the best available spectrum bands to use. CRNs rely on cooperation for much of their functionality to make network more efficient. However, due to the distributed nature of cooperative spectrum sensing, the network is vulnerable to new types of security threats. The current spectrum sensing methods do not provide security mechanism to mitigate against these attacks. Traditional security solutions for noncognitive wireless networks do not work well when they are confronted with these new attacks. Furthermore, the security mechanisms proposed for cognitive radio ad hoc networks are not applicable for resource constrained cognitive radio sensor networks. These present considerable obstacles to development of a security mechanism that can defend against such attacks. This paper investigates threats and defense mechanism applicable for cognitive radio sensor networks to use the proposed guidelines for future development of a security mechanism for cognitive radio sensor networks.
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
Security threat is a crucial issue in cognitive radio network (CRN). These threats come from physical layer, data link layer, network layer, transport layer, and application layer. Hence, security system to all layers in CRN has a responsibility to protect the communication between among Secondary User (SU) or to maintain valid detection to the presence of Primary User (PU) signals. Primary User Emulation Attack (PUEA) is a threat on physical layer where malicious user emulates PU signal. This paper studies the effect of exclusive region of PUEA in CRN. We take two setting of exclusive distances, 30m and 50m, where this radius of area is free of malicious users. Probability of false alarm (Pf) and miss detection (Pm) are used to evaluate the performances. The result shows that increasing distance of exclusive region may decrease Pf and Pm.
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIOijngnjournal
Wireless networks are characterized by fixed spectrum policy. With increasing demands for wireless communication efficiently using the spectrum resources has become an essential issue. Cognitive radio is a form of wireless communication which is used to sense the spectrum and find the free spectrum. It is used by unlicensed users without causing interference to the licensed user. Cognitive radio with the dynamic spectrum access is key technology which provides the best solution by allowing a group of Secondary users to share the radio spectrum originally allocated to the primary users. Dynamically accessing the unused spectrum is known as dynamic spectrum access (DSA) which becomes a promising approach to increase
the efficiency of spectrum usage. In this paper, DSA models are discussed along with different methods such as game theory based method, a measurement-based model, network coded cognitive control channel, Markovian Queuing model, the Delay performance of threshold policies, fuzzy logic based method and spatio-temporal spectrum management model.
With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications. Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data. Purpose of developing data security for data possession at un-trusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in input output costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the input output to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose. The Third Party Auditor is a respective person to manage the remote data in a global manner.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
The wormhole attack in Wireless sensor networks (WSNs) decreases the network performance by dropping the No. of Packets. Many techniques have been proposed to so far reduce the impact of the wormhole attack by detecting and preventing it. But, related work indicates that no technique is perfect for every kind of circumstances of WSNs. Among the existing techniques, Watchdog technique has better performance in preventing the wormhole attack. It utilizes the local knowledge of the next hop node and eavesdrops it. If it gets that spending time of the Packet is more than the given threshold, then it characterizes that node as wormhole attacker. However, this method has several shortcomings that it does not track the link transmission errors, which may be because of congestion in WSNs and also it not offers high mobility for maximum No. of nodes, which eventually decreases the WSNs performance. In order to handle this issue, a new multipoint relay based Watchdog monitoring and prevention technique is proposed in this paper. The proposed technique utilizes the dynamic threshold value to detect the wormhole attacker node, and then clustering and the Watchdog based optimistic path is selected for communicating the Packets. Thus, it reduces the overall Packet dropping, which improves the performance of the WSNs.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
Abstract Communication world is growing day by day In wireless communication system introduces a new technology which I known as cognitive radio network its name as CRN. In CRN Un-authorized user can used empty channel from the spectrum band of authorized user this help to improve the spectrum efficiency as well generate a problem like some malicious or fake users can used the channel and hamper the communication. So in this paper we discuss on security threats and technique to find them with sensing strategies. Keywords: Cognitive radio network, Pus, SUs, Spectrum sensing, spectrum holes
Alinteri Journal of Agriculture Sciences The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the field of agriculture, fisheries, veterinary, biology, and closely related disciplines. We adopt the policy of providing open access to readers who may be interested in recent developments. Is being published online biannually as of 2007.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...IJERA Editor
The need for radio spectrum usage is increasing day by day with recent advancements in wireless system. But there is limited amount of spectrum available. So that for solving this problem Cognitive Radio (CR) is used for purpose of the spectrum utilization properly. Basically the Licensed users use the licensed bands but the unlicensed users should always check spectrum with the help of CR technology. The main aim of cognitive radio is to sense the spectrum continuously. In this paper, we have provided the proposal that how the capacity of the system can be increased by reuse the unused licensed band by simulating a Cognitive radio system. The secondary users can occupy free space (spectrum holes) and also licensed bands by continuously monitoring the spectrum. The requirements of cognitive radio systems will be investigated by considering spectrum sensing techniques. To achieve this, a Cyclostationary Spectrum Sensing technique is studied and applied to detect OFDM signals in a noisy environment. The results are obtained for the applications employed in high frequency, such as, Wi-Fi.
Signal detection in cognitive radio network (CRN) is influenced by several factors. One of them is
malicious user that emulate primary user (PU) signal. Emulation of PU signal causes detection error. This
paper investigates the impact of malicious user attack to PU signal detection. A number of malicious users
are randomly deployed around secondary user (SU) at a certain distance. They attempt to attack primary
signal detection that is transmitted from 100 km to SU receiver. Then, the received signal power at
secondary receiver and the performance of probability of false alarm and probability of miss detection
under two hypothesis of Neyman Pearson criterion are studied. The derived results show that a number of
malicious users has a significant impact to the performance of received power at SU and detection error
rate.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
The rapid growth in wireless communications has contributed to a huge demand on the deployment of new wireless services in both the licensed and unlicensed frequency spectrum. Cognitive Radio Networks (CRNs) is a recently emerging paradigm that aim to opportunistically access the intermittent periods of unoccupied frequency bands and therefore increasing the spectral efficiency. Unlike conventional radios, cognitive radios can intelligently adjust their transmission/reception parameters based on the interaction with the environment and find the best available spectrum bands to use. CRNs rely on cooperation for much of their functionality to make network more efficient. However, due to the distributed nature of cooperative spectrum sensing, the network is vulnerable to new types of security threats. The current spectrum sensing methods do not provide security mechanism to mitigate against these attacks. Traditional security solutions for noncognitive wireless networks do not work well when they are confronted with these new attacks. Furthermore, the security mechanisms proposed for cognitive radio ad hoc networks are not applicable for resource constrained cognitive radio sensor networks. These present considerable obstacles to development of a security mechanism that can defend against such attacks. This paper investigates threats and defense mechanism applicable for cognitive radio sensor networks to use the proposed guidelines for future development of a security mechanism for cognitive radio sensor networks.
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
Security threat is a crucial issue in cognitive radio network (CRN). These threats come from physical layer, data link layer, network layer, transport layer, and application layer. Hence, security system to all layers in CRN has a responsibility to protect the communication between among Secondary User (SU) or to maintain valid detection to the presence of Primary User (PU) signals. Primary User Emulation Attack (PUEA) is a threat on physical layer where malicious user emulates PU signal. This paper studies the effect of exclusive region of PUEA in CRN. We take two setting of exclusive distances, 30m and 50m, where this radius of area is free of malicious users. Probability of false alarm (Pf) and miss detection (Pm) are used to evaluate the performances. The result shows that increasing distance of exclusive region may decrease Pf and Pm.
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIOijngnjournal
Wireless networks are characterized by fixed spectrum policy. With increasing demands for wireless communication efficiently using the spectrum resources has become an essential issue. Cognitive radio is a form of wireless communication which is used to sense the spectrum and find the free spectrum. It is used by unlicensed users without causing interference to the licensed user. Cognitive radio with the dynamic spectrum access is key technology which provides the best solution by allowing a group of Secondary users to share the radio spectrum originally allocated to the primary users. Dynamically accessing the unused spectrum is known as dynamic spectrum access (DSA) which becomes a promising approach to increase
the efficiency of spectrum usage. In this paper, DSA models are discussed along with different methods such as game theory based method, a measurement-based model, network coded cognitive control channel, Markovian Queuing model, the Delay performance of threshold policies, fuzzy logic based method and spatio-temporal spectrum management model.
With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications. Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data. Purpose of developing data security for data possession at un-trusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in input output costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the input output to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose. The Third Party Auditor is a respective person to manage the remote data in a global manner.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
The wormhole attack in Wireless sensor networks (WSNs) decreases the network performance by dropping the No. of Packets. Many techniques have been proposed to so far reduce the impact of the wormhole attack by detecting and preventing it. But, related work indicates that no technique is perfect for every kind of circumstances of WSNs. Among the existing techniques, Watchdog technique has better performance in preventing the wormhole attack. It utilizes the local knowledge of the next hop node and eavesdrops it. If it gets that spending time of the Packet is more than the given threshold, then it characterizes that node as wormhole attacker. However, this method has several shortcomings that it does not track the link transmission errors, which may be because of congestion in WSNs and also it not offers high mobility for maximum No. of nodes, which eventually decreases the WSNs performance. In order to handle this issue, a new multipoint relay based Watchdog monitoring and prevention technique is proposed in this paper. The proposed technique utilizes the dynamic threshold value to detect the wormhole attacker node, and then clustering and the Watchdog based optimistic path is selected for communicating the Packets. Thus, it reduces the overall Packet dropping, which improves the performance of the WSNs.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
Abstract Communication world is growing day by day In wireless communication system introduces a new technology which I known as cognitive radio network its name as CRN. In CRN Un-authorized user can used empty channel from the spectrum band of authorized user this help to improve the spectrum efficiency as well generate a problem like some malicious or fake users can used the channel and hamper the communication. So in this paper we discuss on security threats and technique to find them with sensing strategies. Keywords: Cognitive radio network, Pus, SUs, Spectrum sensing, spectrum holes
Alinteri Journal of Agriculture Sciences The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the field of agriculture, fisheries, veterinary, biology, and closely related disciplines. We adopt the policy of providing open access to readers who may be interested in recent developments. Is being published online biannually as of 2007.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...IJERA Editor
The need for radio spectrum usage is increasing day by day with recent advancements in wireless system. But there is limited amount of spectrum available. So that for solving this problem Cognitive Radio (CR) is used for purpose of the spectrum utilization properly. Basically the Licensed users use the licensed bands but the unlicensed users should always check spectrum with the help of CR technology. The main aim of cognitive radio is to sense the spectrum continuously. In this paper, we have provided the proposal that how the capacity of the system can be increased by reuse the unused licensed band by simulating a Cognitive radio system. The secondary users can occupy free space (spectrum holes) and also licensed bands by continuously monitoring the spectrum. The requirements of cognitive radio systems will be investigated by considering spectrum sensing techniques. To achieve this, a Cyclostationary Spectrum Sensing technique is studied and applied to detect OFDM signals in a noisy environment. The results are obtained for the applications employed in high frequency, such as, Wi-Fi.
Signal detection in cognitive radio network (CRN) is influenced by several factors. One of them is
malicious user that emulate primary user (PU) signal. Emulation of PU signal causes detection error. This
paper investigates the impact of malicious user attack to PU signal detection. A number of malicious users
are randomly deployed around secondary user (SU) at a certain distance. They attempt to attack primary
signal detection that is transmitted from 100 km to SU receiver. Then, the received signal power at
secondary receiver and the performance of probability of false alarm and probability of miss detection
under two hypothesis of Neyman Pearson criterion are studied. The derived results show that a number of
malicious users has a significant impact to the performance of received power at SU and detection error
rate.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Attacks in Cognitive Radio Networks (CRN) A Survey.pdf (20)
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
1. Attacks in Cognitive Radio Networks (CRN)
— A Survey
S. Bhagavathy Nanthini1 *
, M. Hemalatha1
, D. Manivannan1
and L. Devasena 2
1
School of Computing, SASTRA University, Thanjavur, Tamil Nadu-613401, India;
nanthubha@gmail.com, hemalatha@it.sastra.edu, dmv@cse.sastra.edu
2
School of EEE, SASTRA University, Thanjavur, Tamil Nadu-613401, India; devasena@eie.sastra.edu
Abstract
As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services
and their application leads to the spectrum scarcity. In order to utilize the available spectrum efficiently, “cognitive radio”-
The demanding technology is introduced. It is a dynamic technology that can sense the medium, utilizes the available white
spaces, for transmission by detecting its neighboring devices. The cognitive radio targets to increase the efficiency of the
spectrum changes without causing any intervention to the licensed users. Since cognitive radio works in the open network
space, it increases the chance of the attacker to show intervene on the spectral medium. So, the security becomes the key
factor. This leads to the realization of various security threats in the cognitive radio. There are various papers covering
the security issues over the threats in cognitive radio, but this paper provides an advanced survey over attacks and com-
mon threats and the possibility of securing the available spectrum from the attackers. In addition to that future scope and
challenges are also addressed. This survey will help the researchers to identify the space left out and the problems to be
attached related to security issues on cognitive radio.
*Author for correspondence
1. Introduction
For the past decade wireless technology shows a dras-
tic improvement in its technological and its application
aspects. his increases the number of available wireless
users. hese wireless users greatly rely on the available
radio spectrum, which leads to a scarcity in the available
spectrum. he Federal Communications Commission
(FCC) insists that certain portions of the RF spectrum
are made available for public use, which is vacant1
. hese
vacant spaces termed as White space devices comprised
with technologies to prevent interference, Technologies
constitutes spectrum sensing and geo-location capabili-
ties. Based on this a new promising technology called
cognitive radio is implemented. Mitola developed the
design of cognitive radio2
at the defense advanced project
research agency in U.S.A.
Indian Journal of Science and Technology, Vol 7(4), 530–536, April 2014
ISSN (Print) : 0974-6846
ISSN (Online) : 0974-5645
Keywords: Attacks, Digital Signatures, Cognitive-radio, Security, Spread Spectrum Modulation
Cognitive radio is deined as a sotware deined radio3,4
in wireless communication, that sense the environment
and detect the free space amongst the crowded channel,
and utilize the vacant space eiciently. It can also work on
the available channel as a secondary user paving way for
both the user without any interference6
. It is also deined
as a transceiver which has the ability to ind the avail-
able communication channel in the wireless spectrum
and perform transmission and reception characteristics
according to the available channel. While two users rely
on the particular channel there is a possibility of causing
interferences and also there occurs a wide chance for the
attackers to interfere the particular channel. In order to
avoid those possibilities, we are securing cognitive radio
in diferent methods7,8
.
his paper focuses on the analysis of security issues
in various perspectives on the cognitive radio networks.
2. S. Bhagavathy Nanthini, M. Hemalatha, D. Manivannan and L. Devasena
Indian Journal of Science and Technology 531
Vol 7 (4) | April 2014 | www.indjst.org
Vol 7 (4) | April 2014 | www.indjst.org
First view says the various methods of securing cognitive
radios relying over each layer, which is named as layered
attacks. his layered attack can be classiied based on the
various layers in the ISO / OSI model. Attacks falling
under physical layer is said to be a physical layer attack,
which rely on link layer is said to be MAC layer attacks,
and over the network layer is said to be network layer
attacks, and on transport layer is said to be transport layer
attacks. Based on the attacks, threats are detected and the
security measures are taken. Second view conveys the
method of securing the spectrum channel by combining
the cognitive radio with the spread spectrum modula-
tions9
. By using this method the unique characteristics
of the cognitive radio provide a protected and consistent
communication over the given medium. Here, the spread
spectrum modulations are combined with the encryption
technique so that it is possible to secure as well as it can
have the potential to switch over to the various frequency
bands. According to the third view, the CRN is secured
by means of Digital signature9
. Here, eicient Primary
User Identiication (PUI) from public key cryptography
is used to secure the communication made through the
channel. Using this method, the interruption caused by
the other unauthorized users can be avoided. he digital
signature method which uses the public key cryptography
is an efective method and is easily implementable since
its light weighted one and key management is simple.
Attackers launch their attack on each layer, but most
commonly they target on the lower level layer i.e. physi-
cal layer. When comparing the physical layer to the other
corresponding layers the security over the higher layers
is done through various higher layer authentication and
encryption methods. Here, they focus on securing cogni-
tive radio from the lowest layer i.e., physical layer, since
the CR relies heavily on PHY layer spectrum sensing
leaving the system vulnerable to physical layer attacks10,11
.
his physical layer is secured by means of location speciic
information’s by locating the inger prints. By promot-
ing PUE attack the extraction of transmitter ingerprints
is made multipath fading propagation environment.
Wavelett transformations detect the transmitter inger
prints and analyze them.
Another way of securing the cognitive radio is by
means of generating a random number with the help of
various algorithms. Here, all the algorithms that are used
to generate random number is compared and the one
superior algorithm is detected for securing the CR, One
such focused algorithm is ULSI.
In this paper Section 1 covers the methods of secur-
ing layered attacks in cognitive radio. Section2 deals with
securing cognitive radio by the spread spectrum modula-
tion techniques. Section3 points on the speciic layer and
the process of securing it. Section 4 discuss about secur-
ing by means of digital signature method.
2. Cognitive Radio Networks
Now a day, on the whole communication process totally
depends on the wireless medium. Technological improve-
ment reaches the peak level, and their user’s gets increase
in the higher rate. he wireless technology greatly depends
on the radio frequency spectrum, whereas the available
spectrum is low when compared to their utilization. hus
the efective utilization of these spectra becomes a neces-
sity, and so the cognitive radio becomes the promising
technology. he cognitive radio is termed as the sotware
deined radio technology that avails the license to the
unlicensed users without any inference.
It also considered as a model for wireless technol-
ogy which takes an intelligent decision by changing
its transmission or reception parameters based on the
neighboring networks without providing any interference
to other users. he cognitive radio network architecture
can be broadly divided into two clusters: primary network
also named as licensed users in the existing networks. he
other is cognitive radio networks otherwise called as unli-
censed users.
Figure 1 shows the architecture of the cognitive radio,
where the lower most layer is the physical layer. Next
to that there is link layer, network layer and transport
layer. Each layer performs diferent functions which are
explained in detail.
Physical layer performs three functions they are,
Spectrum sensing, Channel estimation and Data trans-
mission. Spectrum sensing becomes the much needed
task when compared to other two functions. As the name
implies, the task of spectrum sensing is to sense the avail-
able free medium for an efective transmission, also to
avoid the occurrence of any interference to potential
primary users in their vicinity. hen comes the channel
estimation, before setting up the link, the quality of the
sub channels is estimated based on their transmission
parameters such as transmit power, bit rate and coding. In
data transmission, ater assigning the spectrum by means
of spectrum sensing and channel estimation, the trans-
mission of data takes place. It should have the capability
3. Attacks in Cognitive Radio Networks (CNR) — A Survey
Indian Journal of Science and Technology
Vol 7 (4) | April 2014 | www.indjst.org
532
to operate at variable symbol rates, diferent channel cod-
ing schemes, power levels, and capable of using multiple
antennas to nullify the interference.
he functions of the link layers are group manage-
ment, link management, and medium access control. In
group management, there will be number of secondary
user groups, where the arriving user can join any of the
existing groups or form a new one through a universal
control channel. Link management covers the set up on
the link to enable the communication between any two
secondary users and also maintain the link until the
duration of the communication. Medium access control
controls the sub channels. If any of the sub channels is
used by the particular secondary users, then the particu-
lar channel cannot be used by any other secondary users.
Whereas the network layers and transport layers known
as the higher layer is used for the transferring of the data
allocating the particular network.
he characteristics over the cognitive radio are
Cognitive capability, Re-conigurability. Cognitive capa-
bility makes the device to sense the environment and to
choose the best available spectrum for transmission. his
becomes possible through the spectrum management
process. Re conigurability enables the device to make
it adapt to its environment by modifying its parameters
such as frequency, modulation etc. here are three dif-
ferent mechanisms in cognitive cycle to analyze the best
spectrum in the available environment. hey are given by
Spectrum sensing in which is used to sense the available
spectrum and chooses the best possible one, Spectrum
analysis is based on the information over the available
spectrum holes and analyzes the network and channel
characteristics for each spectrum hole, Spectrum decision
decides the appropriate spectrum hole for transmission.
3. Need for Security in CRN
Cognitive radio has the capability of adapting to the
environment and make changes based on their com-
munication capabilities for the secure communication.
Comparing the wired network and the wireless network,
the security is susceptible in case of wireless network.
When the data are sent via a wireless network, then there
is a possibility of eavesdropped, or can be altered, jam-
ming may take place. he cognitive radio networks have
a unique characteristic that security becomes essential
over it. his paper has summarized various possibilities
of attacks over it, and the security issues to be taken to
overcome those attacks in CRN.
4. Attacks Over the Layers and
its Detection
he best capability of the cognitive radio network is to
take advantage over the available vacant spaces in a
spectrum. A study done at Berkeley Wireless Research
Center (BWRC) says the frequency ranging from 1GHz
to 10 GHz is underutilized. hese nodes can sense the
Figure 1. Architecture of cognitive Radio
4. S. Bhagavathy Nanthini, M. Hemalatha, D. Manivannan and L. Devasena
Indian Journal of Science and Technology 533
Vol 7 (4) | April 2014 | www.indjst.org
environment and utilize the free spectrum. he challenges
over the Cognitive radio are transparency to primary
users and non-interference. So there occurs an increase
in the possibility for the attackers. he attacks over each
layer are analyzed by four major classes based on the layer
where the attack falls: Physical layer attack, Data Link
layer attack, Network layer attack and Transport layer
attack.
In physical layer the possible attacks are Primary User
Emulation (PUE), objective function attack and jam-
ming13
. First we confer about the PUE attack. he primary
user emulation attack is carried out by a malicious sec-
ondary user emulating a primary user or masquerading
as a primary user to obtain the resource of a given chan-
nel14
. Based on their motivations they are classiied into
two categories. hese are SELFISH PUE: Here, the goal of
the attacker is to increase its share of spectrum resources.
his attack is carried out between two attackers and estab-
lishes a dedicated link between the MALICIOUS PUE: In
malicious PUE, attackers try to prevent the legitimate sec-
ondary users from using the holes found in the spectrum.
he PUE attack can target both the types of cognitive radio
such as learning radios and policy radios15
. When dealing
with the policy radios, the efect of the attack vanishes
when the attackers leave the channel. hen the second-
ary users claim the channel thinking that the channel is
idle. On the other hand in learning radios, information
about the primary users current and the past behaviors
are gathered in order to know when the channel gets idle.
he attackers perform this attack when the channel gets
idle. here are various remedies to solve this PUE attack
one such therapy, and to focus on the cross layer pattern
recognition technique. his technique exploits the radio
signatures of each cognitive radio device. To overcome
this attack, waveform recognition is used to detect the
malevolent devices. he process involved in this pro-
posal are the enrollment in collecting data’s and testing in
order to determine the user his approach is a cross layer
security, which is capable of highlighting the peculiarity
among cognitive radio devices. It is also deined as one of
the perfect method to shield the PUE attack.
he second type of attack in the physical layer is
Objective function attack. In this attack Radio param-
eters are considered such as bandwidth, center frequency,
modulation type, power, encryption type, protocol,coding
rate, frame size, and channel access,. he cognitive engine
calculates these parameters to ind the radio param-
eters that can maximize the data rate and minimize the
power. When cognitive engine is running to calculate
these parameters, the attackers launch their hit. By means
of this hit, the particular attacker takes over the control
make results biased and tailored to his interest. Whenever
the cognitive engine tries to use the higher security level
the attackers commence the jamming attack on the radio
reducing the overall objective function. hen the cogni-
tive engine will refrain from increasing the security level
in order not to decrease the objective function. his attack
is afective only on on-line learning radios and has no
efect on of-line learning radios. here is no good solu-
tion to safe guard cognitive radio from this attack; rather
a simple suggestion is made to deine threshold values for
each radio parameters. If the parameters are not up to the
threshold level the communication stops. he third type
of attack over physical layer is jamming16,17
. In jamming
the attackers or jammer sends the packet continuously to
hamper the legitimate participants in a communication
session. his makes the legitimate user to never sense
the medium as idle, or the attacker sends the packets to
the legitimate user and forces them to receive the junk
packets. It also disrupts the communication by blasting a
radio transmission resulting in the corruption of packets
received by legal users. here exist four types of jammers
they are 1. Constant, 2. Deceptive, 3. Random, 4. Reactive.
Two strategies are used to defend against jamming.
he irst strategy is to escape the denial of service is chan-
nel suring, or frequency hopping. he second strategy is
spatial retreat where legitimate user changes their location
to escape their interference range imposed by the attacker.
In this approach essential point is to leave the region where
the attacker is present and the users must stay within the
range of each other to continue communication.
he attacks on LINK LAYER are Spectrum Sensing
Data Falsiication (SSDF), Control Channel Saturation
Dos attack (CCSD), Selish Channel Negotiation (SCN)18
.
In SSDF the attack occurs when an attacker sends false
local spectrum sensing results to its neighbors or to
the fusion center, causes the receiver to make a wrong
spectrum-sensing decision19
. his attack targets both
centralized and distributed CRNs. In a centralized CRN,
a fusion center is responsible for collecting all the sensed
data and then making a decision on which frequency
bands are occupied and which are set free. Fooling the
fusion center may lose some legitimate users. his type of
attack is defensive by calculating the threshold value. It is
calculated by inding the sum of the collected spectrum
that is sensed. If the sum is above or approx equal to the
5. Attacks in Cognitive Radio Networks (CNR) — A Survey
Indian Journal of Science and Technology
Vol 7 (4) | April 2014 | www.indjst.org
534
threshold value then the sensed efect says the medium is
full by saying that the incumbent signal is present, other-
wise the band is said to be free, i.e., it says the incumbent
signal is absent. Here, there is a possibility of miss detec-
tion. his can be overcome by increasing the threshold
value. Next attack we ind in link layer is Selish channel
negotiation. In multi hop cognitive radio network, a cog-
nitive radio can refuse to forward any data for other host.
his cause the conservation of energy and increase in
throughput. his attack degrades the end to end through-
put of the whole cognitive radio network. he sequential
probability ratio test can be used for this purpose in order
to prove its eiciency in terms of detection time21,22
.
he attacks found in the network layers are sinkhole
attack and HELLO lood attacks20
. In the Sinkhole attack
shows itself as a best route to a speciic destination, luring
neighboring nodes to use it to forward their packets. An
attacker can use this way to perform another attack called
selective forwarding, where he can modify or discard the
packets from any node in the network. his attack is efec-
tive in infrastructure and in a mesh architecture as all the
traic moves through the base station allows the attacker
to falsely claim as a best router for packet forwarding.
his attack is overcome by Geographic routing proto-
cols24
. Geographic protocols try to construct a topology
on demand using only local communication than rely-
ing on the base station. hus the traic will be routed to
the physical location of the base station and it is diicult
to go elsewhere to create a sinkhole. In HELLO lood
attack, the attack gets accomplished when an attacker
sends broadcast messages to all nodes in a network with a
enough power to convince them that it is their neighbor.
When this attack is detected there occurs a possibility of
packet loss, absence of neighbors to forward the packets.
his attack is defended by introducing a key called a sym-
metric key to share it with the trusted base station. he
Kerberos algorithm in cryptography is used to facilitate
the establishment of session keys between the diferent
parties in the network. To prevent an attacker from cre-
ating the session key is by limiting the shared keys. he
symmetric key is suggested because they are faster and
lower overhead on system resources.
In transport layer the possible attack is LION attacks23
.
In LION attack, it uses the primary user emulation attack
to disrupt transmission control protocol (tcp) connection.
It’s said to be a cross layer attack pointed at the transport
layer where imitating a licensed transmission will force a
crn to achieve a frequency handofs and thus degrading
tcp performance. he attacker intercepts the messages,
and it predicts to be in hand of when the frequency band
is tested and by claiming it using the PUE results in a total
network starvation.
5. Cognitive Radio along with
Spread Spectrum Modulation
Here, cognitive radio is secured by means of the spread
spectrum modulation. Cognitive utilizes the licensed
spectrum for transmission where, the security for such
spectrum is essential. Such, a secure communication is
made by the combinations of spread spectrum modula-
tion and encryption algorithms with the cognitive radio
technology. Cognitive radio is said to be an advancement
of SDR making the sensing and adaptation parameters
dynamic. Cognitive radio can be viewed as a collabora-
tive form of an application constitutes SDR and intelligent
signal processing also comprises the functional elements
of radio lexibility, spectral awareness and intelligent
decision making. Various encryption techniques are also
applied to secure the cognitive radios, the commonly
used techniques are symmetric encryption technique rec-
ognized as private key encryption algorithm. Commonly
used techniques are RSA, elliptic, SHA etc.
6. Securing Spectrum Sensing
in Multi-Channel
In this paper, the cornered attack is the byzantine attacks.
Byzantine attack includes coalition head and CR as their
attackers. hese attackers targets on reducing the channels
available and sense the multichannel cooperative spec-
trum sensing. he probability of these attacks is derived
and a new selection formula is formulated for the coali-
tion head. he probability of the change in local decision
for each cognitive radio becomes the Byzantine attacker
by which the probability of attack is derived. When the
Byzantine attackers continue their attack, contribution
of their related coalitions in the system decreases and
they get blocked out of the coalition. In considering the
distributed cooperative multichannel spectrum sensing,
attacks such as coalition head and multichannel byz-
antine attacks are introduced. he simulation is being
carried out to overcome the block attackers; the results
have concluded that the various counter attacks can be
used to mask the attackers from the coalition head. It also
6. S. Bhagavathy Nanthini, M. Hemalatha, D. Manivannan and L. Devasena
Indian Journal of Science and Technology 535
Vol 7 (4) | April 2014 | www.indjst.org
increases the number of the channels available when the
attackers are present.
7. Protocols for the Dynamic
Cognitive Radio Networks
he Spectrum Sensing, resource allocation and man-
agement is the issues largely focused by cognitive radio
networks. here are many existing protocols are intro-
duced as a challenge to the process of the CRN. he lack
of centralized authority makes the selish node incline
towards the self-centered behavior to maximize their
supports. Here, a cross-layer is proposed for avoiding
the selish performance in the routing protocols for the
dynamic cognitive radio network in preference to selish
nodes. Simulation results proposed that SAR provides
better performance, by means of higher throughput,
lower delay, and better delivery ratio. So, it can be said as
the cross layer selishness avoiding routing protocol.
8. Secure Communication based
on Digital Signature
Cognitive radio is a challenging concept to improve
the consumption of limited electromagnetic spectrum
resources for upcoming wireless communications. It is
essential to secure the cognitive radios to avoid inter-
ference. here may be various members join the CRN
or vacate the network any time. So there occurs a com-
pulsion to secure the network. his is done through the
digital signature. Here, there are two users utilizing the
cognitive radio. hey are primary user and secondary
user. Primary is of licensed user and secondary is of unli-
censed user who can use the medium cognitively without
causing injurious to the primary user. Here the primary
user identiication technique is used to secure the cogni-
tive. Various encryption techniques are used to safeguard
the cognitive networks.
9. Conclusion
his paper discusses about the threats found in the cogni-
tive radio networks, it is considered as one of the eicient
methods to make use of the available spectrum. he lack
of available spectrum, and increase in the applications
on wireless systems made the cognitive radio an adapt-
able method in the demanding wireless technology. he
discussion provided here gives a reliable measure to make
it as an analysis paper relating the possible threats and
their remedial methods.
10. References
1. El-Hajj W, Safa H, Guizani M. Survey of security issues in
cognitive radio networks. J Internet Tech. 2011; 12(2).
2. Mitola J III. Sotware radios – survey, critical evaluation
and future directions. IEEE Aero Electron Syst Mag. 1993
Apr; 8(4):25–36.
3. Tuttlebee W. Sotware deined radio: enabling technologies.
Chichester: Wiley; 2002.
4. Ulversøy T. Sotware deined radio: challenges and oppor-
tunities. IEEE Communications Surveys & Tutorials. 2010;
12(4):531–50.
5. Hsu C-S, Chen Y-S, He C-E. An eicient dynamic adjust-
ing MAC protocol for multichannel cognitive wireless
networks. 2010 IEEE International Conference on Wireless
Communications, Networking and Information Security
(WCNIS); 2010 Jun 25–27; Beijing, China. IEEE. p. 556–60.
6. LiuY, ZhaoZ,TangH.Radioresourcemanagementbetween
two user classes in cognitive radio communication. 2010
Second International Conference on Networks Security.
Wireless Communications and Trusted Computing. 2010
Apr 24–25; Wuhan, Hubei . IEEE. p. 215–18.
7. Tang L, Wu J. Research and analysis on cognitive radio net-
work security. Computer Science & Communications. 2012
Apr; 4(4):120–26.
8. Zhang Y, Xu GC, Geng XZ. Security threats in cogni-
tive radio networks. 10th IEEE International Conference
on High Performance Computing and Communications.
HPCC ‘08. 2008 Sep 25–27; Dalian. IEEE. p. 1–7.
9. Parvin S, Hussain FK. Digital signature-based secure com-
munication in cognitive radio networks. 2011 International
Conference on Broadband and Wireless Computing,
Communication and Applications (BWCCA). Barcelona.
IEEE. p. 9–12.
10. Zhao C, Xie L, Jiang X, Huang L, YaoA Y. PHY-layer
authentication approach for transmitter identiication in
cognitive radio networks. 2010 International Conference
on Communications and Mobile Computing (CMC). 2010
Ap 12–14; Shenzhen. IEEE. p. 154–58.
11. Wang H, Lightfoot L, Li T. On PHY-layer security of cog-
nitive radio:collaborative sensing under malicious attacks.
44th Annual Conference on Information Sciences and
Systems (CISS); 2010 Mar 217–19; Princeton, NJ. IEEE.
p. 66–73.
12. Sampath A, Dai H, Zheng H, Zhao BY. Multichannel jam-
ming attacks using cognitive radios. Proceedings of 16th
International Conference on Computer Communications
7. Attacks in Cognitive Radio Networks (CNR) — A Survey
Indian Journal of Science and Technology
Vol 7 (4) | April 2014 | www.indjst.org
536
and Networks. ICCCN 2007; 2007 Aug 13–16; Honolulu,
HI. IEEE. p. 352–57.
13. Chen R, Park J-M. Ensuring trustworthy spectrum sensing
in cognitive radio networks. SDR ‘06.1st IEEE Workshop
on Networking Technologies for Sotware Deined Radio
Networks; 2006 Sep 25; Reston, VA, USA. IEEE. p. 110–19.
14. Anand S, Jin Z, Subbalakshmi K. An Analytical model for
primary user emulation attacks in cognitive radio net-
works. 3rd IEEE Symposium on New Frontiers in Dynamic
Spectrum Access Networks. DySPAN; 2008 Oct; Chicago,
IL. IEEE. p. 3905–14.
15. Pei Y, Liang Y-C, Zhang L, he KC, Li KH. Secure commu-
nication over MISO cognitive radio channels. IEEE Trans
Wireless Comm. 2010; 9:1494–502.
16. Xu W, Trappe W, Zhang Y, Wood T. he feasibility of launch-
ing and detecting jamming attacks in wireless networks.
MobiHoc ‘05 Proceedings of the 6th ACM international
symposium on Mobile ad hoc networking and computing;
2005 May; Urbana, IL. p. 46–57.
17. Sampath A, Dai H, Zheng H, Zhao BY. Multi-channel jam-
ming attacks using cognitive radios, Proceedings of 16th
International Conference on Computer Communications
and Networks (ICCCN 2007). 2007 Aug 13–16; Honolulu,
HI. IEEE. p. 352–57.
18. Kaligineedi P, Khabbazian M, Bhargava VK. Secure cooper-
ative sensing techniques for cognitive radio systems. IEEE
International Conference on Communications (ICC ‘08).
2008 May. Beijing, China. IEEE. p. 3406–10.
19. Wang W, Li H, Sun Y, Han Z. Attack-proof collaborative
spectrum sensing in cognitive radio networks. 43rd Annual
Conference on Information Sciences and Systems (CISS
2009). 2009 Mar; Baltimore, MD. IEEE. p. 130–34.
20. Wang W, Sun Y, Li H, Han Z. Cross-layer attack and defense
in cognitive radio networks. 2010 Dec 6–10. Miami, FL.
IEEE. p. 1–6.
21. Zhu L, Zhou H. Two types of attacks against cognitive
radio network MAC protocols. International Conference
on Computer Science and Sotware Engineering; 2008 Dec;
Wuhan, China. IEEE. p.1110–13.
22. Bian K, Park J-M. MAC-layer misbehaviors in multi-hop
cognitive radio networks. US-Korea Conference on Science,
Technology, and Entrepreneurship (UKC2006); 2006 Aug.
23. Hernandez-Serrano J, León O, Soriano M. Modeling the
Lion Attack in Cognitive Radio Networks. EURASIP
Journal on Wireless Communications and Networking.
2011; 10:242–304.
24. Hu Y-C, Johnson DB, Perrig A. SEAD: secure eicient dis-
tance vector routing for mobile wireless ad hoc networks.
Proceedings of the Fourth IEEE Workshop on Mobile
Computing Systems and Applications (WMCSA’02);
2002 Jun; Callicoon, NY.