Cognitive radio network security: A survey
Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio...
| Main Authors: | , , , , , |
|---|---|
| Format: | Journal Article |
| Published: |
Academic Press
2012
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/11339 |
| _version_ | 1848747779182034944 |
|---|---|
| author | Hussain, Omar Hussain, Farookh Parvin, Sazia Han, Song Tian, Biming Chang, Elizabeth |
| author_facet | Hussain, Omar Hussain, Farookh Parvin, Sazia Han, Song Tian, Biming Chang, Elizabeth |
| author_sort | Hussain, Omar |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio networks (CRNs) can be formed using cognitive radios by extending the radio link features to network layer functions. The objective of CRN architecture is to improve the whole network operation to fulfil the user’s demands anytime and anywhere, through accessing CRNs in a more efficient way, rather than by just linking spectral efficiency. CRNs are more flexible and exposed to wireless networks compared with other traditional radio networks. Hence, there are many security threats to CRNs, more so than other traditional radio environments. The unique characteristics of CRNs make security more challenging. Several crucial issues have not yet been investigated in the area of security for CRNs. A typical public key infrastructure (PKI) scheme which achieves secure routing and other purposes in typical adhoc networks is not enough to guarantee the security of CRNs under limited communication and computation resources. However, there has been increasing research attention on security threats caused specifically by CR techniques and special characteristics of CR in CRNs. Therefore, in this research, a survey of CRNs and their architectures and security issues has been carried out in a broad way in this paper. |
| first_indexed | 2025-11-14T06:54:34Z |
| format | Journal Article |
| id | curtin-20.500.11937-11339 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T06:54:34Z |
| publishDate | 2012 |
| publisher | Academic Press |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-113392017-09-13T16:06:10Z Cognitive radio network security: A survey Hussain, Omar Hussain, Farookh Parvin, Sazia Han, Song Tian, Biming Chang, Elizabeth secondary users trust radio security attacks primary users Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio networks (CRNs) can be formed using cognitive radios by extending the radio link features to network layer functions. The objective of CRN architecture is to improve the whole network operation to fulfil the user’s demands anytime and anywhere, through accessing CRNs in a more efficient way, rather than by just linking spectral efficiency. CRNs are more flexible and exposed to wireless networks compared with other traditional radio networks. Hence, there are many security threats to CRNs, more so than other traditional radio environments. The unique characteristics of CRNs make security more challenging. Several crucial issues have not yet been investigated in the area of security for CRNs. A typical public key infrastructure (PKI) scheme which achieves secure routing and other purposes in typical adhoc networks is not enough to guarantee the security of CRNs under limited communication and computation resources. However, there has been increasing research attention on security threats caused specifically by CR techniques and special characteristics of CR in CRNs. Therefore, in this research, a survey of CRNs and their architectures and security issues has been carried out in a broad way in this paper. 2012 Journal Article http://hdl.handle.net/20.500.11937/11339 10.1016/j.jnca.2012.06.006 Academic Press restricted |
| spellingShingle | secondary users trust radio security attacks primary users Hussain, Omar Hussain, Farookh Parvin, Sazia Han, Song Tian, Biming Chang, Elizabeth Cognitive radio network security: A survey |
| title | Cognitive radio network security: A survey |
| title_full | Cognitive radio network security: A survey |
| title_fullStr | Cognitive radio network security: A survey |
| title_full_unstemmed | Cognitive radio network security: A survey |
| title_short | Cognitive radio network security: A survey |
| title_sort | cognitive radio network security: a survey |
| topic | secondary users trust radio security attacks primary users |
| url | http://hdl.handle.net/20.500.11937/11339 |