Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks

Syed Rizvi, John Mitchell, Nathan Showan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.

Original languageEnglish (US)
Title of host publication8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479941209
DOIs
StatePublished - Jan 1 2014
Event8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Astana, Kazakhstan
Duration: Oct 15 2014Oct 17 2014

Publication series

Name8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings

Other

Other8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014
CountryKazakhstan
CityAstana
Period10/15/1410/17/14

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks'. Together they form a unique fingerprint.

  • Cite this

    Rizvi, S., Mitchell, J., & Showan, N. (2014). Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks. In 8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings [7035911] (8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICAICT.2014.7035911