Journal ArticleDOI
A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions
Alireza Attar,H. Tang,Athanasios V. Vasilakos,F. R. Yu,Victor C. M. Leung +4 more
- Vol. 100, Iss: 12, pp 3172-3186
Reads0
Chats0
TLDR
This survey presents a comprehensive list of major known security threats within a cognitive radio network (CRN) framework, namely exogenous (external) attackers, intruding malicious nodes and greedy cognitive radios (CRs), and discusses potential solutions to combat those attacks.Abstract:
In this survey, we present a comprehensive list of major known security threats within a cognitive radio network (CRN) framework. We classify attack techniques based on the type of attacker, namely exogenous (external) attackers, intruding malicious nodes and greedy cognitive radios (CRs). We further discuss threats related to infrastructure-based CRNs as well as infrastructure-less networks. Besides the short-term effects of attacks over CRN performance, we also discuss the often ignored longer term behavioral changes that are enforced by such attacks via the learning capability of CRN. After elaborating on various attack strategies, we discuss potential solutions to combat those attacks. An overview of robust CR communications is also presented. We finally elaborate on future research directions pertinent to CRN security. We hope this survey paper can provide the insight and the roadmap for future research efforts in the emerging field of CRN security.read more
Citations
More filters
Journal ArticleDOI
Wireless Network Virtualization: A Survey, Some Research Issues and Challenges
Chengchao Liang,F. Richard Yu +1 more
TL;DR: This paper identifies several important aspects of wireless network virtualization: overview, motivations, framework, performance metrics, enabling technologies, and challenges, and explores some broader perspectives in realizing wireless networkvirtualization.
Journal ArticleDOI
Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges
TL;DR: The 5C architecture that is widely adopted to characterize the Industrial Internet systems is presented and the enabling technologies of each layer that cover from industrial networking, industrial intelligent sensing, cloud computing, big data, smart control, and security management are investigated.
Journal ArticleDOI
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends
TL;DR: The existing literature of this fast emerging application area of cognitive radio wireless sensor networks is classified, the key research that has already been undertaken is highlighted, and open problems are indicated.
Journal ArticleDOI
Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey
Rajesh K. Sharma,Danda B. Rawat +1 more
TL;DR: This paper presents the recent advances on security threats/attacks and countermeasures in CRNs focusing more on the physical layer by categorizing them in terms of their types, their existence in the CR cycle, network protocol layers, and game theoretic approaches.
Journal ArticleDOI
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
TL;DR: This paper proposes a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks, and provides an in-depth tutorial on the state-of-the-art Byzantine defense schemes.
References
More filters
Journal ArticleDOI
Cognitive radio: brain-empowered wireless communications
TL;DR: Following the discussion of interference temperature as a new metric for the quantification and management of interference, the paper addresses three fundamental cognitive tasks: radio-scene analysis, channel-state estimation and predictive modeling, and the emergent behavior of cognitive radio.
Proceedings ArticleDOI
Ad-hoc on-demand distance vector routing
C.E. Perkins,E.M. Royer +1 more
TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Journal ArticleDOI
On Limits of Wireless Communications in a Fading Environment when UsingMultiple Antennas
G. J. Foschini,M. J. Gans +1 more
TL;DR: In this article, the authors examined the performance of using multi-element array (MEA) technology to improve the bit-rate of digital wireless communications and showed that with high probability extraordinary capacity is available.
Journal ArticleDOI
Technical Note : \cal Q -Learning
Chris Watkins,Peter Dayan +1 more
TL;DR: This paper presents and proves in detail a convergence theorem forQ-learning based on that outlined in Watkins (1989), showing that Q-learning converges to the optimum action-values with probability 1 so long as all actions are repeatedly sampled in all states and the action- values are represented discretely.
Journal ArticleDOI
A survey of spectrum sensing algorithms for cognitive radio applications
T. Yucek,Huseyin Arslan +1 more
TL;DR: In this paper, a survey of spectrum sensing methodologies for cognitive radio is presented and the cooperative sensing concept and its various forms are explained.