Abstract

Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.

Highlights

  • Cognitive Radio (CR) [1] technology promises to intelligently solve the issues in conventional wireless technology related to their limited and under-utilised spectrum [2]

  • These vulnerabilities can leads to varied threats, which can be classified into two different categories: the first relates to common security threats in both conventional wireless and CR networks, and the second category is specific to CRN users

  • CRN is far more exposed to security threats than those facing the conventional wireless technology

Read more

Summary

INTRODUCTION

Cognitive Radio (CR) [1] technology promises to intelligently solve the issues in conventional wireless technology related to their limited and under-utilised spectrum [2]. Radio networks’ (CRN) technology has its own intrinsic fundamental approach and principles for dynamic operation within the environment, unlike in the conventional wireless approach, which is based on the static radio frequency spectrum with fixed licensed users (primary users (PUs)) and fixed channels [9] This indicates that the cognitive ability and reconfiguration capability are the core elements that make CR an advanced technology, which grants dynamic access to the unused spectrum for both licensed and unlicensed users through certain characteristics: adoption, awareness, modification, capability of learning, observation, and communication in realistic environments [10,11,12,13,14,15,16].

COGNITIVE RADIO CORE FUNCTIONS
SECURITY CALLENGES IN CRN CORE FUNCTIONS
Spectrum Challenges in Spectrum Management
Security Challenges in Spectrum Mobility
Security Challenges in Spectrum Sharing
SECURITY THREATS
Common Security Threats in Conventional Wireless and CR Networks
Specific Security Threats in CR Networks
Protection Mechanism in CRNs
Detection schemes in CRNs
Comparisons of the Presented Schemes
OPEN RESEARCH AREAS AND CHALLENGES
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.