Show simple item record

dc.contributor.authorAlhakami, Wajdien
dc.contributor.authorMansour, Alien
dc.contributor.authorSafdar, Ghazanfar Alien
dc.date.accessioned2014-11-25T13:29:55Z
dc.date.available2014-11-25T13:29:55Z
dc.date.issued2014
dc.identifier.citationAlhakam, W., Mansour, A. and Safdar, G.A. (2014) 'Spectrum Sharing Security and Attacks in CRNs: a Review', International Journal of Advanced Computer Science and Applications, 5(1):76-87en
dc.identifier.issn2156-5570
dc.identifier.issn2158-107X
dc.identifier.doi10.14569/IJACSA.2014.050111
dc.identifier.urihttp://hdl.handle.net/10547/336090
dc.description.abstractCognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges.
dc.language.isoenen
dc.publisherSAI Organizationen
dc.relation.urlhttp://thesai.org/Publications/ViewPaper?Volume=5&Issue=1&Code=IJACSA&SerialNo=11en
dc.rightsArchived with thanks to International Journal of Advanced Computer Science and Applicationsen
dc.subjectdynamic spectrum accessen
dc.subjectspectrum sharingen
dc.subjectcommon control channelen
dc.subjectcognitive radio networksen
dc.titleSpectrum sharing security and attacks in CRNs: a reviewen
dc.typeArticleen
dc.contributor.departmentUniversity of Bedfordshireen
dc.identifier.journalInternational Journal of Advanced Computer Science and Applicationsen
html.description.abstractCognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges.


Files in this item

Thumbnail
Name:
Paper_11.pdf
Size:
727.0Kb
Format:
PDF
Description:
Full article

This item appears in the following Collection(s)

  • Centre for Wireless Research (CWR)
    The Centre for Wireless Research brings together expertise in the areas of mobile and wireless sensor networks. The breadth and depth of the expertise make the Centre rich with research and innovation potential.

Show simple item record