2010
DOI: 10.1002/dac.1102
|View full text |Cite
|
Sign up to set email alerts
|

Securing cognitive radio networks

Abstract: Postprint (published version

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
65
0
3

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(68 citation statements)
references
References 30 publications
(30 reference statements)
0
65
0
3
Order By: Relevance
“…The specific features of CRNs entail several new threats [3], but one is now standing out from the rest: the primary user emulation (PUE) attack. In this attack an entity pretends to be a primary user or incumbent by transmitting a signal with similar characteristics to a primary signal or replaying a real one, thus preventing secondary users from using a vacant band.…”
Section: Introductionmentioning
confidence: 99%
“…The specific features of CRNs entail several new threats [3], but one is now standing out from the rest: the primary user emulation (PUE) attack. In this attack an entity pretends to be a primary user or incumbent by transmitting a signal with similar characteristics to a primary signal or replaying a real one, thus preventing secondary users from using a vacant band.…”
Section: Introductionmentioning
confidence: 99%
“…Although there are a few proposals on CRNs [4], most research has focused on the on-going standard IEEE 802.22 [3] for Wireless Regional Area Networks (WRANs). This standard defines a centralized CRN operating in a point-tomultipoint basis, formed by a a base station and a set of nodes attached to the base station via a wireless link.…”
Section: Introductionmentioning
confidence: 99%
“…Although cognitive radio is similar to the traditional wireless network, using a wireless medium instead of a wire to transmit information, it faces different vulnerabilities, which has resulted in the discarding of the communication process among end users [41][42]. These vulnerabilities can leads to varied threats, which can be classified into two different categories: the first relates to common security threats in both conventional wireless and CR networks, and the second category is specific to CRN users.…”
Section: Security Threatsmentioning
confidence: 99%