2021
DOI: 10.1049/cmu2.12131
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security issues in cognitive radio based cooperative sensing

Abstract: Cognitive radio based cooperative spectrum sensing (CSS) is severely affected when some secondary users maliciously attack it. Two attacks regarded as key adversaries to the success of CSS are spectrum sensing data falsification (SSDF) and primary user emulation attack (PUEA). Defending SSDF and PUEAs has received significant attention in research in the past decade globally. This paper performs a state-of-the-art comprehensive survey of the researches on defending SSDF and PUEAs. First, the preliminaries like… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 123 publications
0
7
0
Order By: Relevance
“…19 Shrivastava et al performed a state-of-the-art comprehensive survey of the researches on defending spectrum sensing data falsification and primary user emulation attack. 20 Fragkiadakis et al presented an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks. 21 Sun et al investigated the physical layer security in cognitive radio networks, which consists of a source node, a destination node, an eavesdropper, and multiple relays.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…19 Shrivastava et al performed a state-of-the-art comprehensive survey of the researches on defending spectrum sensing data falsification and primary user emulation attack. 20 Fragkiadakis et al presented an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks. 21 Sun et al investigated the physical layer security in cognitive radio networks, which consists of a source node, a destination node, an eavesdropper, and multiple relays.…”
Section: Related Workmentioning
confidence: 99%
“…Manohar et al incorporated an artificial intelligence approach called reinforcement learning into a trust model to countermeasure the random and intelligent attacks 19 . Shrivastava et al performed a state‐of‐the‐art comprehensive survey of the researches on defending spectrum sensing data falsification and primary user emulation attack 20 . Fragkiadakis et al presented an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state‐of‐the‐art to detect the corresponding attacks 21 …”
Section: Related Workmentioning
confidence: 99%
“…Then, cooperative spectrum sensing (CSS) is proposed to achieve cooperative gain by exploiting spatial diversity and enhance the spectrum sensing performance. [4][5][6] But this cooperative paradigm also opens a window for malicious users (MUs) to launch Byzantine attack, who may manipulate their sensing results and impair the cooperation process at the fusion center (FC), 7,8 therefore undermining the premise of the CR network (CRN). Hence, how to efficiently and effectively defend against Byzantine attack is necessary for CSS to identify available spectrum resources.…”
Section: Introductionmentioning
confidence: 99%
“…In a cognitive radio network (CRN) consisting of the primary user (PU), and the secondary user (SU), 2 two kinds of users have different priorities to spectrum access. By means of the spectrum sensing technology, 3 when the SU has detected that the targeted channel is underutilized by the PU and then use spectrum in an opportunistic manner 4‐8 . If the SU has detected that the PU is utilizing the targeted channel, then the SU must immediately free up the channel for the PU without causing interference to primary networks.…”
Section: Introductionmentioning
confidence: 99%
“…sensing technology, 3 when the SU has detected that the targeted channel is underutilized by the PU and then use spectrum in an opportunistic manner. [4][5][6][7][8] If the SU has detected that the PU is utilizing the targeted channel, then the SU must immediately free up the channel for the PU without causing interference to primary networks.…”
mentioning
confidence: 99%