Show simple item record

dc.contributor.authorHussain, Omar
dc.contributor.authorHussain, Farookh
dc.contributor.authorParvin, Sazia
dc.contributor.authorHan, Song
dc.contributor.authorTian, Biming
dc.contributor.authorChang, Elizabeth
dc.date.accessioned2017-01-30T11:24:08Z
dc.date.available2017-01-30T11:24:08Z
dc.date.created2012-12-16T20:00:18Z
dc.date.issued2012
dc.identifier.citationParvin, Sazia and Hussain, Farookh Khadeer and Hussain, Omar Khadeer and Han, Song and Tian, Biming and Chang, Elizabeth. 2012. Cognitive radio network security: A survey. Journal of Network and Computer Applications. 35 (6): pp. 1691-1708.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/11339
dc.identifier.doi10.1016/j.jnca.2012.06.006
dc.description.abstract

Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio networks (CRNs) can be formed using cognitive radios by extending the radio link features to network layer functions. The objective of CRN architecture is to improve the whole network operation to fulfil the user’s demands anytime and anywhere, through accessing CRNs in a more efficient way, rather than by just linking spectral efficiency. CRNs are more flexible and exposed to wireless networks compared with other traditional radio networks. Hence, there are many security threats to CRNs, more so than other traditional radio environments. The unique characteristics of CRNs make security more challenging. Several crucial issues have not yet been investigated in the area of security for CRNs. A typical public key infrastructure (PKI) scheme which achieves secure routing and other purposes in typical adhoc networks is not enough to guarantee the security of CRNs under limited communication and computation resources. However, there has been increasing research attention on security threats caused specifically by CR techniques and special characteristics of CR in CRNs. Therefore, in this research, a survey of CRNs and their architectures and security issues has been carried out in a broad way in this paper.

dc.publisherAcademic Press
dc.subjectsecondary users
dc.subjecttrust
dc.subjectradio
dc.subjectsecurity
dc.subjectattacks
dc.subjectprimary users
dc.titleCognitive radio network security: A survey
dc.typeJournal Article
dcterms.source.volume35
dcterms.source.startPage1961
dcterms.source.endPage1708
dcterms.source.issn1084-8045
dcterms.source.titleJournal of Network and Computer Applications
curtin.department
curtin.accessStatusFulltext not available


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record