Cognitive radio network security: A survey

Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio...

Full description

Bibliographic Details
Main Authors: Hussain, Omar, Hussain, Farookh, Parvin, Sazia, Han, Song, Tian, Biming, Chang, Elizabeth
Format: Journal Article
Published: Academic Press 2012
Subjects:
Online Access:http://hdl.handle.net/20.500.11937/11339
_version_ 1848747779182034944
author Hussain, Omar
Hussain, Farookh
Parvin, Sazia
Han, Song
Tian, Biming
Chang, Elizabeth
author_facet Hussain, Omar
Hussain, Farookh
Parvin, Sazia
Han, Song
Tian, Biming
Chang, Elizabeth
author_sort Hussain, Omar
building Curtin Institutional Repository
collection Online Access
description Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio networks (CRNs) can be formed using cognitive radios by extending the radio link features to network layer functions. The objective of CRN architecture is to improve the whole network operation to fulfil the user’s demands anytime and anywhere, through accessing CRNs in a more efficient way, rather than by just linking spectral efficiency. CRNs are more flexible and exposed to wireless networks compared with other traditional radio networks. Hence, there are many security threats to CRNs, more so than other traditional radio environments. The unique characteristics of CRNs make security more challenging. Several crucial issues have not yet been investigated in the area of security for CRNs. A typical public key infrastructure (PKI) scheme which achieves secure routing and other purposes in typical adhoc networks is not enough to guarantee the security of CRNs under limited communication and computation resources. However, there has been increasing research attention on security threats caused specifically by CR techniques and special characteristics of CR in CRNs. Therefore, in this research, a survey of CRNs and their architectures and security issues has been carried out in a broad way in this paper.
first_indexed 2025-11-14T06:54:34Z
format Journal Article
id curtin-20.500.11937-11339
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T06:54:34Z
publishDate 2012
publisher Academic Press
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-113392017-09-13T16:06:10Z Cognitive radio network security: A survey Hussain, Omar Hussain, Farookh Parvin, Sazia Han, Song Tian, Biming Chang, Elizabeth secondary users trust radio security attacks primary users Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio networks (CRNs) can be formed using cognitive radios by extending the radio link features to network layer functions. The objective of CRN architecture is to improve the whole network operation to fulfil the user’s demands anytime and anywhere, through accessing CRNs in a more efficient way, rather than by just linking spectral efficiency. CRNs are more flexible and exposed to wireless networks compared with other traditional radio networks. Hence, there are many security threats to CRNs, more so than other traditional radio environments. The unique characteristics of CRNs make security more challenging. Several crucial issues have not yet been investigated in the area of security for CRNs. A typical public key infrastructure (PKI) scheme which achieves secure routing and other purposes in typical adhoc networks is not enough to guarantee the security of CRNs under limited communication and computation resources. However, there has been increasing research attention on security threats caused specifically by CR techniques and special characteristics of CR in CRNs. Therefore, in this research, a survey of CRNs and their architectures and security issues has been carried out in a broad way in this paper. 2012 Journal Article http://hdl.handle.net/20.500.11937/11339 10.1016/j.jnca.2012.06.006 Academic Press restricted
spellingShingle secondary users
trust
radio
security
attacks
primary users
Hussain, Omar
Hussain, Farookh
Parvin, Sazia
Han, Song
Tian, Biming
Chang, Elizabeth
Cognitive radio network security: A survey
title Cognitive radio network security: A survey
title_full Cognitive radio network security: A survey
title_fullStr Cognitive radio network security: A survey
title_full_unstemmed Cognitive radio network security: A survey
title_short Cognitive radio network security: A survey
title_sort cognitive radio network security: a survey
topic secondary users
trust
radio
security
attacks
primary users
url http://hdl.handle.net/20.500.11937/11339