2020
DOI: 10.1016/j.phycom.2020.101001
|View full text |Cite
|
Sign up to set email alerts
|

Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 59 publications
(24 citation statements)
references
References 130 publications
0
22
0
Order By: Relevance
“…In contrast to traditional cryptography-based authentication, physical layer authentication can fill the gap of the security mechanism in the physical layer. Furthermore, since the secure fundamental is based on physical properties, the physical layer authentication is free from key distribution and management, which is more suitable for heterogeneous networks, dense networks, low-complex IoT devices and other 5G networks [8], [14]- [17].…”
Section: A Spoofing Attack Detectionmentioning
confidence: 99%
“…In contrast to traditional cryptography-based authentication, physical layer authentication can fill the gap of the security mechanism in the physical layer. Furthermore, since the secure fundamental is based on physical properties, the physical layer authentication is free from key distribution and management, which is more suitable for heterogeneous networks, dense networks, low-complex IoT devices and other 5G networks [8], [14]- [17].…”
Section: A Spoofing Attack Detectionmentioning
confidence: 99%
“…During the sensing process, SUs, under this attack, may detect attacker signals as primary user signals and then refrain from using the spectrum. A range of countermeasures against PUE attack has been investigated in the literature [109]. These countermeasures can be categorized into four types: countermeasures based on cryptography, countermeasures based on fingerprint, countermeasures based on game theory, and hybrid countermeasures that combine the three other types [109].…”
Section: Some Of the Cybersecurity Attacks In Cognitive Radiomentioning
confidence: 99%
“…A range of countermeasures against PUE attack has been investigated in the literature [109]. These countermeasures can be categorized into four types: countermeasures based on cryptography, countermeasures based on fingerprint, countermeasures based on game theory, and hybrid countermeasures that combine the three other types [109]. Spectrum sensing data falsification (SSDF) attack, also known as Byzantine attack, specially targets cooperative spectrum sensing and consists in compromising the fusion center with false spectrum sensing results to deceive decisionmaking.…”
Section: Some Of the Cybersecurity Attacks In Cognitive Radiomentioning
confidence: 99%
“…Introduction: The eavesdropping attack has been a long-term cyber security threat in wireless and cognitive radio networks, and it is carried out by tuning an unauthorized device to a proper frequency to overhear radio-frequency (RF) signals transmitted from legitimate users [1]. Such attacks can be categorized into two types: active eavesdropping and passive eavesdropping.…”
mentioning
confidence: 99%