Abstract

This is the era of Intelligent Cognitive Radio Network (CRN) technology that provides the available spectrum with efficient utilization. Cognitive Radio (CR) technology must promise to allow interference-free spectrum access by users. The paper discusses the several attacks and motives of attacks. The authentication mechanism role to prevent the attacks for hassle-free spectrum utilization is demonstrated. In this paper, resolving the cognitive network security issues by the authentication mechanism and the methods and need of authentication is discussed. This paper addresses the research challenges in the way of securing the CRN and countermeasures in CRN security strategies. Spectrum sensing data falsification (SSDF) attack is most disruptive in which the malicious users degrade the decision-making process by sending the false sensing reports to data fusion center’s thus preventing honest users from utilizing the spectrum. In this paper, to counter the SSDF attack, the trust-based security mechanism is demonstrated to authenticate the honest users and it is observed that the proposed framework in the MATLAB environment is efficient and able to detect malicious users. CR technology is the strategy applied to the spectrum to make it efficient for wireless communication. The strategy is an intelligent way to access the spectrum as it can learn its environment and make decisions by easy adaptation of operating parameters. The initial step is to sense the spectrum available further steps are spectrum decision making, spectrum management, and spectrum mobility. The network is vulnerable to various attacks on spectrum sensing and policy protocols which lead to disturbing functionality of CR technology. The defence mechanism based on public-key cryptography is proposed in which the Primary User (PU) is authenticated by appending signature provided to PU signal. Authentication with a tag to the primary users is another perspective proposed. CRN technology should provide integrity, confidentiality and authenticity to the users.

Highlights

  • Introduction to Cognitive Radio NetworkThe Cognitive Radio, the term given by Joseph Mitola III in 1998 presented the concept for wireless technologies that “the related networks are sufficiently computationally intelligent about radio resources and related computer-to-computer communications to detect user communications needs as a function of user context and to provide radio resources and wireless services most appropriate to those needs”

  • A security mechanism based on public-key cryptography, New York City, which is authenticating with the addition of the signature, gave a signal, at the New York city identification are used to find the early adopters are the most likely

  • The password is allowed to give to regular secondary users and for a new user, the login access is created with their identity verification

Read more

Summary

Introduction to Cognitive Radio Network

The Cognitive Radio, the term given by Joseph Mitola III in 1998 presented the concept for wireless technologies that “the related networks are sufficiently computationally intelligent about radio resources and related computer-to-computer communications to detect user communications needs as a function of user context and to provide radio resources and wireless services most appropriate to those needs”. The users that are owned by different measures for the different base stations in the case of a distributed CRN is likely to reduce the self-serving goal is to make an individual decision to work together with the other secondary users to act on their own or with the help of distributes. Effective control of such self-serving actions and the need to ensure the fairness of the network and help honest users to compare, in order to achieve a better touch of the features is the requirement. A possible way to integrate the CRNS confidence in the modelling involves identifying the identity of the user[5]

Cognitive Radio Functioning
Spectrum Sensing Techniques
Functionalities of Cognitive Radio Network
Addressing Security Issues
Attacks on Cognitive Radio Network
Literature Review
Research Gaps and Challenges
Problem Formulation
Methodology Used
Spectrum Sensing Module
Spectrum Optimization Module
Authentication Module
User Identification
Search Algorithm
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call