2015
DOI: 10.1186/s13635-015-0021-0
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

Abstract: Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new ways for attackers, namely in the context of the effective detection of incumbent or primary users (PUs), the most fund… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
13
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 36 publications
(13 citation statements)
references
References 56 publications
(111 reference statements)
0
13
0
Order By: Relevance
“…In which, identifying the position and velocity of the mobile nodes is an important process. Also, it is essential to determine the channel allocation and spectrum coefficient for satisfying the traffic demand . The following conditions must be satisfied for improving the QoS of the CRN: scheduling must be properly performed based on the priority. Network collision must be avoided even high levels of traffic. Also, delay must be reduced and throughput should be improved with high queuing condition. …”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In which, identifying the position and velocity of the mobile nodes is an important process. Also, it is essential to determine the channel allocation and spectrum coefficient for satisfying the traffic demand . The following conditions must be satisfied for improving the QoS of the CRN: scheduling must be properly performed based on the priority. Network collision must be avoided even high levels of traffic. Also, delay must be reduced and throughput should be improved with high queuing condition. …”
Section: Introductionmentioning
confidence: 99%
“…Also, it is essential to determine the channel allocation and spectrum coefficient for satisfying the traffic demand. 3 The following conditions must be satisfied for improving the QoS of the CRN:…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is one of the earliest and the most problems in the security of cognitive radio networks. Now, PUEA has become a problem of security threats, which can lead to serious DOS (denial of service) in cognitive radio networks by the widespread concern [2]. Z. JIN proposed an analytical model as a detection mechanism for DoS apply, especially proposed an analysis me-thod for PUEA, using Fenton's approximation method and Wald's continuous probability ratio test [3].…”
Section: Introductionmentioning
confidence: 99%
“…The range of the MU attack is a loop area, the outer radius of the loop is2 r , and the inner radius is 1 SU's exclusive protection distance, and the size of the 2 r is limited by the transmission power of the MU. MU can be informed of the value time, accurately.…”
mentioning
confidence: 99%