2015
DOI: 10.1016/j.comnet.2015.01.011
|View full text |Cite
|
Sign up to set email alerts
|

A framework for resilient and secure spectrum sensing on cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 34 publications
0
10
0
Order By: Relevance
“…In the same context as IEEE 802.22, the European Computer Manufacturers Association (ECMA)-392 workgroup aims at designing mechanisms to enable wireless devices to exploit the white spaces in the television frequency bands. Soto and Nogueira [17] state that, despite recently proposed protocols, architectures, and standards already including security (e.g., see IEEE 802.11 SCMP in Section 1.4), they use conventional techniques that are not sufficient to prevent CR networks from the attacks described in this survey. We also believe that reviewing existing limitations in normalization activities, such as FCC specifying that no modifications are allowed on primary networks, can contribute to make identifying PU emulation attacks less challenging, even when PUs are mobile and not known a priori.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the same context as IEEE 802.22, the European Computer Manufacturers Association (ECMA)-392 workgroup aims at designing mechanisms to enable wireless devices to exploit the white spaces in the television frequency bands. Soto and Nogueira [17] state that, despite recently proposed protocols, architectures, and standards already including security (e.g., see IEEE 802.11 SCMP in Section 1.4), they use conventional techniques that are not sufficient to prevent CR networks from the attacks described in this survey. We also believe that reviewing existing limitations in normalization activities, such as FCC specifying that no modifications are allowed on primary networks, can contribute to make identifying PU emulation attacks less challenging, even when PUs are mobile and not known a priori.…”
Section: Discussionmentioning
confidence: 99%
“…Other than the employment of classic cryptographic approaches to support security mechanisms designed for CR environments, we may note that the most important challenges to research and standardization work regarding security reside in the design of security solutions to cope with the threats that are inherent to the cognitive nature of such environments, as previously discussed [17]. Such threats may potentially challenge the main goal of CR, which is the usage of the available radio spectrum space in a fair and optimal way, while preserving primary or incumbent transmitters from interferences.…”
Section: Approaches To Attack-tolerant Primary User Detection On Cr Ementioning
confidence: 99%
“…Hence, this section focuses on highlighting the importance of resilience in the context of UbiComp systems. We overview the state-of-the-art regarding to resilience in the UbiComp systems and point out future directions for research and innovation [135][136][137][138]. We also understand that resilience in these systems still requires a lot of investigations, however we believe that it was our role to raise this point to discussion through this article.…”
Section: Resiliencementioning
confidence: 95%
“…The problem of network-failure resilience and its correlated concepts (such as survivability and fault-tolerance) have been addressed in a number of studies in the last few years, within the context of wireless ad hoc networks. The causes of these failures include the following: hardware/software faults, operator errors, malicious or selfish attacks, and natural disasters [10,14,15]. In a nutshell, when an attempt is made to tackle the problem of resilience in wireless ad hoc networks, the main focus is on connectivity management restoring a physical topology [14], providing redundancy [16,17] or applying technologies that can opportunistically use radio spectrum frequency [15].…”
Section: Related Workmentioning
confidence: 99%
“…The causes of these failures include the following: hardware/software faults, operator errors, malicious or selfish attacks, and natural disasters [10,14,15]. In a nutshell, when an attempt is made to tackle the problem of resilience in wireless ad hoc networks, the main focus is on connectivity management restoring a physical topology [14], providing redundancy [16,17] or applying technologies that can opportunistically use radio spectrum frequency [15]. Although these previous works have made some improvements, very few of them address resilience in vehicular ad hoc networks [18], but rather, tend to focus on specific types of applications, such as video streaming [1,19] or user authentication [20].…”
Section: Related Workmentioning
confidence: 99%