{"title":"认知无线网络中的安全性:使用商用IEEE 802.22标准的示例","authors":"A. Mody, R. Reddy, T. Kiernan, T. Brown","doi":"10.1109/MILCOM.2009.5380058","DOIUrl":null,"url":null,"abstract":"Security in wireless networks is challenging. Security in cognitive radio networks (CRN) is even more challenging. This is because a CRN consists of cognitive radios (CR) which have many more functions and processes to account for, such as sensing, geolocation, spectrum management, access to the policy database etc. Each of these functions and processes need to be assessed for potential vulnerabilities and security mechanisms need to be provided for protection of not just the secondary users of the spectrum but also the primary users or the incumbents. This paper discusses the potential security vulnerabilities and the remediations for the same in a CRN with an example using a commercial IEEE 802.22 standard. Due to the unique characteristics of the CRs in a CRN, enhanced security mechanisms are required. The security mechanisms in CRN are divided into several security sub-layers which protect non-cognitive as well as cognitive functions of the system and the interactions between the two. This paper describes these security features as incorporated into the IEEE 802.22 standard. It is possible to apply similar security mechanisms for a military CRN.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":"{\"title\":\"Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard\",\"authors\":\"A. Mody, R. Reddy, T. Kiernan, T. Brown\",\"doi\":\"10.1109/MILCOM.2009.5380058\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security in wireless networks is challenging. Security in cognitive radio networks (CRN) is even more challenging. This is because a CRN consists of cognitive radios (CR) which have many more functions and processes to account for, such as sensing, geolocation, spectrum management, access to the policy database etc. Each of these functions and processes need to be assessed for potential vulnerabilities and security mechanisms need to be provided for protection of not just the secondary users of the spectrum but also the primary users or the incumbents. This paper discusses the potential security vulnerabilities and the remediations for the same in a CRN with an example using a commercial IEEE 802.22 standard. Due to the unique characteristics of the CRs in a CRN, enhanced security mechanisms are required. The security mechanisms in CRN are divided into several security sub-layers which protect non-cognitive as well as cognitive functions of the system and the interactions between the two. This paper describes these security features as incorporated into the IEEE 802.22 standard. It is possible to apply similar security mechanisms for a military CRN.\",\"PeriodicalId\":338641,\"journal\":{\"name\":\"MILCOM 2009 - 2009 IEEE Military Communications Conference\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-10-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"21\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2009 - 2009 IEEE Military Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2009.5380058\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2009 - 2009 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2009.5380058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard
Security in wireless networks is challenging. Security in cognitive radio networks (CRN) is even more challenging. This is because a CRN consists of cognitive radios (CR) which have many more functions and processes to account for, such as sensing, geolocation, spectrum management, access to the policy database etc. Each of these functions and processes need to be assessed for potential vulnerabilities and security mechanisms need to be provided for protection of not just the secondary users of the spectrum but also the primary users or the incumbents. This paper discusses the potential security vulnerabilities and the remediations for the same in a CRN with an example using a commercial IEEE 802.22 standard. Due to the unique characteristics of the CRs in a CRN, enhanced security mechanisms are required. The security mechanisms in CRN are divided into several security sub-layers which protect non-cognitive as well as cognitive functions of the system and the interactions between the two. This paper describes these security features as incorporated into the IEEE 802.22 standard. It is possible to apply similar security mechanisms for a military CRN.