2018
DOI: 10.1016/j.jisa.2017.11.010
|View full text |Cite
|
Sign up to set email alerts
|

Network layer attacks and countermeasures in cognitive radio networks: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 35 publications
(13 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…The cognitive radio network is subject to several attacks that can create a denial of service [36][37][38]. For instance, if a channel is jammed, the communication is interrupted.…”
Section: Discussionmentioning
confidence: 99%
“…The cognitive radio network is subject to several attacks that can create a denial of service [36][37][38]. For instance, if a channel is jammed, the communication is interrupted.…”
Section: Discussionmentioning
confidence: 99%
“…For instance, authors in [30], listed several common security attacks/threats to CR physical layer and proposed some countermeasures that can be utilized to protect CR users. In [31], the authors presented a list of current network layer attacks and their countermeasures. Authors in [32], have presented a secured transmission approach that can be used in a CR-based network.…”
Section: A Related Workmentioning
confidence: 99%
“…Several malicious activities or attacks can target CRN, including selfish access (SA) one to the idle spectrum, namely, an entire deny of service (DoS). Nowadays, various techniques have been investigated to detect such attack activities.…”
Section: Introductionmentioning
confidence: 99%