{"title":"认知无线网络中安全攻击和威胁的分类","authors":"John N. Soliman, T. A. Mageed, H. El-Hennawy","doi":"10.1109/JEC-ECC.2017.8305794","DOIUrl":null,"url":null,"abstract":"Cognitive radio networks (CRNs) are thought to be the most encouraging solution in enhancing the spectrum utilization and solving the spectrum scarcity, however due to the nature of these intelligent networks and its accessing methods from licensed and unlicensed users, CRNs are exposed to different types of threats and attacks from different malicious users more than traditional wireless networks, which can affect the network availability and performance. In this paper, recent security attacks and threats on CRNs will be investigated and introduced in order to study the security aspects for CRNs that can be used to guard and secure CRNs from the well-known attacks.","PeriodicalId":406498,"journal":{"name":"2017 Japan-Africa Conference on Electronics, Communications and Computers (JAC-ECC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Taxonomy of security attacks and threats in cognitive radio networks\",\"authors\":\"John N. Soliman, T. A. Mageed, H. El-Hennawy\",\"doi\":\"10.1109/JEC-ECC.2017.8305794\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cognitive radio networks (CRNs) are thought to be the most encouraging solution in enhancing the spectrum utilization and solving the spectrum scarcity, however due to the nature of these intelligent networks and its accessing methods from licensed and unlicensed users, CRNs are exposed to different types of threats and attacks from different malicious users more than traditional wireless networks, which can affect the network availability and performance. In this paper, recent security attacks and threats on CRNs will be investigated and introduced in order to study the security aspects for CRNs that can be used to guard and secure CRNs from the well-known attacks.\",\"PeriodicalId\":406498,\"journal\":{\"name\":\"2017 Japan-Africa Conference on Electronics, Communications and Computers (JAC-ECC)\",\"volume\":\"124 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Japan-Africa Conference on Electronics, Communications and Computers (JAC-ECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JEC-ECC.2017.8305794\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Japan-Africa Conference on Electronics, Communications and Computers (JAC-ECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JEC-ECC.2017.8305794","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Taxonomy of security attacks and threats in cognitive radio networks
Cognitive radio networks (CRNs) are thought to be the most encouraging solution in enhancing the spectrum utilization and solving the spectrum scarcity, however due to the nature of these intelligent networks and its accessing methods from licensed and unlicensed users, CRNs are exposed to different types of threats and attacks from different malicious users more than traditional wireless networks, which can affect the network availability and performance. In this paper, recent security attacks and threats on CRNs will be investigated and introduced in order to study the security aspects for CRNs that can be used to guard and secure CRNs from the well-known attacks.