Modeling the Lion Attack in Cognitive Radio Networks (original) (raw)

Simulation framework for security threats in cognitive radio networks

IET Communications, 2012

Along with Cognitive Radio Networks are been developed, to design optimistic security mechanisms is becoming a big challenge. This paper proposes a taxonomy of attacks on Cognitive Radio Networks. This will help researches in the area to better understand the security problems and design more optimistic countermeasures. A new simulation framework for security threats has been developed to check all these attacks and countermeasures. Simulation framework has been tested with a Primary User Emulation attack. A new testbed for simulations suitable for CR security is ready.

Analysis of Attacks in Cognitive Radio Networks

Cognitive Radio (CR) is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. It solves the spectrum scarcity problem by allocating the spectrum dynamically to unlicensed users. It uses the free spectrum bands which are not being used by the licensed users without causing interference to the incumbent transmission. So, spectrum sensing is the essential mechanism on which the entire communication depends. Cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. So that it causes the crucial threat in the cognitive radio network. In this paper, our objectives are to give the various security issues in cognitive radio networks and advantage and disadvantage of security mechanisms with the existing techniques to mitigate it.

A layered approach to cognitive radio network security: A survey

Computer Networks, 2014

Cognitive radios have been identified as a solution to the crowded spectrum issue. With the realization of cognitive radio networks came the recognition that both new and old security threats are relevant. The cognitive radio network is still vulnerable to many of the denial of service, wormhole, routing, and jamming attacks that plague other wireless technologies. In addition, the cognitive radio network is vulnerable to new attacks based on cognitive radio innovations, such as spectrum sharing, spectrum sensing, cognitive capability, and radio reconfigurability. The scope of this survey is to present an overview of security threats and challenges to the cognitive radio network, especially focusing on new solutions from 2012 and the first half of 2013. Included are prior mitigation techniques that are adaptive to the new technology, as well as new mitigation techniques specifically targeted at new cognitive radio vulnerabilities. The threats provided are organized according to the protocol layer at which the attack is targeted.

IJERT-Overview of Challenges in Securing a Cognitive Radio Network

International Journal of Engineering Research and Technology (IJERT), 2016

https://www.ijert.org/overview-of-challenges-in-securing-a-cognitive-radio-network https://www.ijert.org/research/overview-of-challenges-in-securing-a-cognitive-radio-network-IJERTV5IS010327.pdf Going forward, wireless communications will require more efficient use of licensed radio frequency spectrum. The cognitive radio (CR) technology provides a suitable framework for this purpose. Cognitive Radio Network (CRN) is a promising wireless network where smart devices are able to opportunistically exploit the spectrum holes and optimize the overall radio spectrum use. Secure communication is the key of success for any wireless network. As cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks. Along with the realization of cognitive radios, new security threats have been raised. In this paper, we discuss various security threats which are unique to CRNs along with various DoS attacks in ad hoc cognitive radio networks spread across different protocol layers.

Cognitive Radio Networks Security Threats and Attacks: A Review

Cognitive Radio (CR) is a technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It aims to improve the utilization of the radio spectrum. Although the operational aspects of CR are being explored widely, its security aspects have gained little attention. In this survey, we present a comprehensive list of major known security threats and attacks within a Cognitive Radio Network (CRN). Our objective in this paper is to analyze the security issues of the main recent developments (which includes attacks and mitigations) of Cognitive Radio Networks. We hope that this survey paper can provide the insight and the roadmap for future research efforts in the emerging field of CRN security and utility.

A Layer Based Survey on the Security Issues of Cognitive Radio Networks

Cognitive radio (CR) forms the elucidation to spectrum scarcity. The CR enables the unlicensed user (secondary user) to utilize the unused spectrum (under utilized band) of the licensed user (primary user) without causing any intrusion with the licensed user. The CR is capable of sensing, analyzing and deciding the spectrum. The adaptability and wireless nature of CR makes it more vulnerable security threats than other wireless networks. In this paper, a layered approach to the cognitive radio network security is presented. i.e., an extensive overview of the major attacks at different layers is given. Also the mitigation methods of these attacks are assessed. Cross layer attacks are also dealt with their mitigation techniques.

Attacks in Cognitive Radio Networks (CRN) — A Survey

As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services and their application leads to the spectrum scarcity. In order to utilize the available spectrum efficiently, "cognitive radio"-The demanding technology is introduced. It is a dynamic technology that can sense the medium, utilizes the available white spaces, for transmission by detecting its neighboring devices. The cognitive radio targets to increase the efficiency of the spectrum changes without causing any intervention to the licensed users. Since cognitive radio works in the open network space, it increases the chance of the attacker to show intervene on the spectral medium. So, the security becomes the key factor. This leads to the realization of various security threats in the cognitive radio. There are various papers covering the security issues over the threats in cognitive radio, but this paper provides an advanced survey over attacks and common threats and the possibility of securing the available spectrum from the attackers. In addition to that future scope and challenges are also addressed. This survey will help the researchers to identify the space left out and the problems to be attached related to security issues on cognitive radio.

An analytical model for primary user emulation attacks in cognitive radio networks

2008

In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no analytical model relating the various parameters that could cause a PUE attack has been proposed and studied. We propose an analytical approach based on Fenton's approximation and Markov inequality and obtain a lower bound on the probability of a successful PUEA on a secondary user by a set of co-operating malicious users. We consider a fading wireless environment and discuss the various parameters that can affect the feasibility of a PUEA. We show that the probability of a successful PUEA increases with the distance between the primary transmitter and secondary users. This is the first analytical treatment to study the feasibility of a PUEA.