2012
DOI: 10.1109/surv.2011.032511.00097
|View full text |Cite
|
Sign up to set email alerts
|

Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
89
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 173 publications
(93 citation statements)
references
References 69 publications
0
89
0
1
Order By: Relevance
“…Some of the threats are jamming of control channels, masquerading of primary or cognitive radio users, unauthorized use of spectrum, integrity of cognitive radio messages and the node itself etc. (Baldini, Sturman et al 2012). Fadlullah, Nishiyama et al (2013) have presented an intrusion detection system for CRAHN that identifies various types of anomalies based on a learning model.…”
Section: Research Issues In Crahnmentioning
confidence: 99%
“…Some of the threats are jamming of control channels, masquerading of primary or cognitive radio users, unauthorized use of spectrum, integrity of cognitive radio messages and the node itself etc. (Baldini, Sturman et al 2012). Fadlullah, Nishiyama et al (2013) have presented an intrusion detection system for CRAHN that identifies various types of anomalies based on a learning model.…”
Section: Research Issues In Crahnmentioning
confidence: 99%
“…The accuracy on detecting spectrum holes determines the efficiency of exploiting the spectrum. Thus, either sensing errors related to hardware outages [3], [4] or susceptibility to specialized attacks on the sensing functionality can result in significant performance degradation.…”
Section: Introductionmentioning
confidence: 99%
“…However, these security measures are not sufficient to preserve the correctness of spectrum sensing results against attacks and intrusions [4]. Preventive security mechanisms, as cryptography, provide confidentiality, integrity and authentication, but they are inefficient against data injection overload, interception, manipulation or impersonation attacks, such as Denial of Services (DoS), PU emulation (PUE) attacks and jamming.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations