{"title":"认知无线电网络安全威胁综述","authors":"Nikita Mishra, S. Srivastava, S. N. Sharan","doi":"10.1109/ICCT46177.2019.8969053","DOIUrl":null,"url":null,"abstract":"Overcrowded ISM band and inefficient spectrum utilization at a licensed band lead to the development of Cognitive Radio Network. It is an intelligent wireless technology capable of learning and adapting changes in surrounding environment parameters. However, the security of Cognitive radio restricts its widespread application. In addition to traditional wireless network security threats, cognitive radios are vulnerable to new threats posed by flexible spectrum allocation policy. Various attacks are targeting the physical, MAC, network, transport and application layers of a protocol stack. There is a need to have an excellent knowledge of the attacker’s characteristics for secure and robust Cognitive Radio deployment. This paper meticulously recaps the security hazards posed to the cognitive radio network at various layers. Also, we have summarized attacks according to protocol layer and security requirements in a tabular format.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cognitive Radio Network Security Threats: A Review\",\"authors\":\"Nikita Mishra, S. Srivastava, S. N. Sharan\",\"doi\":\"10.1109/ICCT46177.2019.8969053\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Overcrowded ISM band and inefficient spectrum utilization at a licensed band lead to the development of Cognitive Radio Network. It is an intelligent wireless technology capable of learning and adapting changes in surrounding environment parameters. However, the security of Cognitive radio restricts its widespread application. In addition to traditional wireless network security threats, cognitive radios are vulnerable to new threats posed by flexible spectrum allocation policy. Various attacks are targeting the physical, MAC, network, transport and application layers of a protocol stack. There is a need to have an excellent knowledge of the attacker’s characteristics for secure and robust Cognitive Radio deployment. This paper meticulously recaps the security hazards posed to the cognitive radio network at various layers. Also, we have summarized attacks according to protocol layer and security requirements in a tabular format.\",\"PeriodicalId\":118655,\"journal\":{\"name\":\"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT46177.2019.8969053\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT46177.2019.8969053","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cognitive Radio Network Security Threats: A Review
Overcrowded ISM band and inefficient spectrum utilization at a licensed band lead to the development of Cognitive Radio Network. It is an intelligent wireless technology capable of learning and adapting changes in surrounding environment parameters. However, the security of Cognitive radio restricts its widespread application. In addition to traditional wireless network security threats, cognitive radios are vulnerable to new threats posed by flexible spectrum allocation policy. Various attacks are targeting the physical, MAC, network, transport and application layers of a protocol stack. There is a need to have an excellent knowledge of the attacker’s characteristics for secure and robust Cognitive Radio deployment. This paper meticulously recaps the security hazards posed to the cognitive radio network at various layers. Also, we have summarized attacks according to protocol layer and security requirements in a tabular format.