A Survey of Security Issues in Cognitive Radio Networks

来源 :中国通信 | 被引量 : 0次 | 上传用户:wenhui10005
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. In the last decade, cognitive radio (CR) has emerged as a major next generation wireless networking technology, which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization. However, there exists enormous challenges for the open and random access environment of CRNs, where the unlicensed secondary users (SUs) can use the channels that are not currently used by the licensed primary users (PUs) via spectrum-sensing technology. Some of the access methods, some malicious users may access the cognitive network arbitrarily and launch some special attacks, such as primary user emulation attack, falsifying data or denial of service attack, which will cause serious damage to the cognitive radio network. addition to the specifi c security threats of cognitive network, CRNs also face up to the conventional security threats, such as eavesdropping, tampering, imitation, forgery, and noncooperation etc..ence, Cognitive radio networks have much more risks than t raditional wireless networks with its special network model. In this paper, we considered the security threats from passive and active attacks. Firstly, the PHY layer security is presented in the view of passive attacks, and it is a compelling idea of ​​using the physical properties of the radio channel to help provide secure wireless communications. Moreover, malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection. Finally, we discuss the general countermeasures of security attacks in three phases.In particular, we discuss the far reaching effect of defensive strategy against attacks in CRNs.
其他文献
随着三网融合试点政策的出台,广电及电信的业态结构将发生重大改变;同时在3年保护期结束后,国家将根据试点结果,不断完善三网融合方案。其都将会对运营商的业务运营带来一些
据有关专家预测,2010年我国木材需求总量为29130万立方米,比1999年增加14730万立方米,增长一倍多。2010年我国如果国内生产木材8000万立方米,则需进口21000万立方 Accordin
交互式电子白板对课堂教学起着非常重要的作用。因此,在数学教学过程中,我们可以借助电子白板来给学生创设有效的合作情境,以确保学生在相互交流与互相合作中掌握知识、锻炼
虽然福费廷是一种贸易融资方式,但是可以预测,URF800的推出将促进全球货物、服务贸易的发展。福费廷业务是一项与出口贸易密切相关的新型贸易融资业务产品,是指银行或其他金
目前,国内玉米价格全线上涨.业内人士估计,玉米价格还会走高.主要有几个原因:①今年干旱程度超过往年,直接影响秋玉米产量,减产在所难免.这种心理预期作用势必对价格走势产生
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
期刊
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
期刊
近年来,随着我国社会生活水平的不断提高、计算机技术和网络技术突飞猛进的发展,人们都已深刻感受到来自信息化、网络化时代的冲击,因而越来越重视网络技术在生产生活中的地
2009年3月我科收治了1例卡氏肺孢子虫肺炎伴获得性免疫缺陷综合征(AIDS)并存梅毒及乙型肝炎的患者,经过精心的治疗和护理,取得满意的疗效,现报告如下.
防波堤作为重要的港域掩护建筑物,具有诸多的结构型式。文章以图文形式介绍了国内外多种型式的斜波堤、直立堤和特殊型式防波堤,并简要介绍了它们的应用特点。 Breakwater a