Cognitive radio network security: A survey
dc.contributor.author | Hussain, Omar | |
dc.contributor.author | Hussain, Farookh | |
dc.contributor.author | Parvin, Sazia | |
dc.contributor.author | Han, Song | |
dc.contributor.author | Tian, Biming | |
dc.contributor.author | Chang, Elizabeth | |
dc.date.accessioned | 2017-01-30T11:24:08Z | |
dc.date.available | 2017-01-30T11:24:08Z | |
dc.date.created | 2012-12-16T20:00:18Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Parvin, Sazia and Hussain, Farookh Khadeer and Hussain, Omar Khadeer and Han, Song and Tian, Biming and Chang, Elizabeth. 2012. Cognitive radio network security: A survey. Journal of Network and Computer Applications. 35 (6): pp. 1691-1708. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/11339 | |
dc.identifier.doi | 10.1016/j.jnca.2012.06.006 | |
dc.description.abstract |
Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio networks (CRNs) can be formed using cognitive radios by extending the radio link features to network layer functions. The objective of CRN architecture is to improve the whole network operation to fulfil the user’s demands anytime and anywhere, through accessing CRNs in a more efficient way, rather than by just linking spectral efficiency. CRNs are more flexible and exposed to wireless networks compared with other traditional radio networks. Hence, there are many security threats to CRNs, more so than other traditional radio environments. The unique characteristics of CRNs make security more challenging. Several crucial issues have not yet been investigated in the area of security for CRNs. A typical public key infrastructure (PKI) scheme which achieves secure routing and other purposes in typical adhoc networks is not enough to guarantee the security of CRNs under limited communication and computation resources. However, there has been increasing research attention on security threats caused specifically by CR techniques and special characteristics of CR in CRNs. Therefore, in this research, a survey of CRNs and their architectures and security issues has been carried out in a broad way in this paper. | |
dc.publisher | Academic Press | |
dc.subject | secondary users | |
dc.subject | trust | |
dc.subject | radio | |
dc.subject | security | |
dc.subject | attacks | |
dc.subject | primary users | |
dc.title | Cognitive radio network security: A survey | |
dc.type | Journal Article | |
dcterms.source.volume | 35 | |
dcterms.source.startPage | 1961 | |
dcterms.source.endPage | 1708 | |
dcterms.source.issn | 1084-8045 | |
dcterms.source.title | Journal of Network and Computer Applications | |
curtin.department | ||
curtin.accessStatus | Fulltext not available |