TY - GEN
T1 - Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks
AU - Rizvi, Syed
AU - Mitchell, John
AU - Showan, Nathan
PY - 2014
Y1 - 2014
N2 - Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.
AB - Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.
UR - http://www.scopus.com/inward/record.url?scp=84988305167&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84988305167&partnerID=8YFLogxK
U2 - 10.1109/ICAICT.2014.7035911
DO - 10.1109/ICAICT.2014.7035911
M3 - Conference contribution
AN - SCOPUS:84988305167
T3 - 8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings
BT - 8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014
Y2 - 15 October 2014 through 17 October 2014
ER -