Study of Attacks and their Defence Methods in CRN : A Survey

Authors(2) :-Aasia Rehman, Deo Prakash

Cognitive Radio Technology is considered as a developing technology in which wireless nodes are skilled in such a way that they can change their transmitting parameters dynamically as per the sensed data from the radio spectrum to utilize the deficient spectrum in an efficient and promising way. Although CRN can improve the overall network performance but it is susceptible to a number of security attacks due to its flexibility and disclosed wireless nature. The various attacks on CRN have been classified as physical layer, MAC layer, network layer, transport layer attacks, application layer attacks and cross layer attacks. This paper provides the introduction to CRN, its working process, Architecture of CRN, Cognitive Radio Engine Architecture, various classes of Attacks and their defence methods.

Authors and Affiliations

Aasia Rehman
Lecturer, P.G Department of Computer Science in Kashmir University, Srinagar, J&K, India
Deo Prakash
Assistant Professor, Department of CSE in SMVD University, India

CRN, RF, FCC, Cognitive Radio, Cognitive Radio Networks, Jamming, Primary User Emulation Attack, Dynamic Spectrum Access

  1. Beibei Wang and K. J. Ray Liu, "Advances in Cognitive Radio Networks: A Survey," IEEE Journal of Selected Topics in Signal Processing, vol. 5, no. 1, (Wang & Liu) February 2011.
  2. Wassi (Wang & Liu, 2011)m El-Hajj1, Haidar Safa1, Mohsen Guizani, "Survey of Security Issues in Cognitive Radio Networks," Journal of Internet Technology Volume 12 ,2011.
  3. Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran , Shantidev Mohanty, "NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey," Computer Networks. Elsevier, 2006.
  4. F.K. Jondral, "Software-defined radio-basic and evolution to cognitive radio," EURASIP Journal on Wireless Communication and Networking 2005.
  5. Sazia Parvin , FarookhKhadeerHussain , OmarKhadeerHussain , SongHan , BimingTian , Elizabeth Chang, "Cognitive radio network security: A survey,"Elsevier Journal Of Networks and Computer Applications 35, 2012.
  6. Yenumula B. Reddy, " Security Issues and Threats in Cognitive Radio Networks," AICT 2013:The Ninth Advanced International Conference on Telecommunications.
  7. T. Charles Clancy, Nathan Goergen, "Security in cognitive radio networks: threats and mitigation," 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008. Crown Com 2008, 2008, pp 1–8 (IEEE).
  8. J. Mitola, "Cognitive radio: An integrated agent architecture for software defined radio," Ph.D. Dissertation, KTH, 2000.
  9. Mansi Subhedar1 and Gajanan Birajdarok, "Spectrum Sensing Techniques in Cognitive Radio Networks: a survey," International Journal of Next-Generation Networks (IJNGN) vol.3, no.2, june 2011.
  10. Ekram Hossain, Vijay Bhargava (2007), "Cognitive Wireless Communication Networks", Springer
  11. D. Cabric, A. Tkachenko, and R. Brodersen, (2006) "Spectrum sensing measurements of pilot, energy and collaborative detection," Proceeding of IEEE Military Commun. Conf., Washington,D.C., USA, pp: 1-7.
  12. Ian F. Akyildiz, Brandon F. Lo, Ravikumar (2011), "Cooperative spectrum sensing in cognitiveradio networks: A survey, Physical Communication", pp: 40-62.
  13. A. Min, K. Shin, (2009), "An optimal sensing framework based on spatial RSS profile in cognitive radio networks", Proceedings of IEEE SECON, pp: 1-9.
  14. Rajesh K. Sharmaand Danda B. Rawat, "Advances on Security Threats and Countermeasuresfor Cognitive Radio Networks: A Survey" IEEE Communications Surveys & Tutorials.
  15. Gaurav Bansal, Md. Jahangir Hossain, Praveen Kaligineedi, Hugues Mercier, Chris Nicola, Umesh Phuyal, Md.Mamunur Rashid, Kapila C. Wavegedara, Ziaul Hasan, Majid Khabbazian, and Vijay K. Bhargava, "Some Research Issues in Cognitive Radio Networks,"IEEE 2007.
  16. Ruiliang Chen and Jung-Min Park, "Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks," First IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR), Reston, VA, September, 2006, pp.110-119.
  17. Ruiliang Chen, Jung-Min Park and Jeffrey H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE Journal on Selected Areas in Communications, Vol.26, No.1, 2008, pp.25-37.
  18. Lianfen Huang, Liang Xie, Han Yu, Wumei Wang and Yan Yao, "Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks," International Conference on Communications and Mobile Computing (CMC), Vol.2, Shenzhen, China, April, 2010, pp.169-173
  19. O. Richard Afolabi, Kiseon Kim and Aftab Ahmad, "On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature," Proceedings of 18th International Conference on Computer Communications and Networks (ICCCN 2009), San Francisco, CA, August, 2009, pp.1-5.
  20. Olga León, Juan Hernández-Serrano and Miguel Soriano, "Securing Cognitive Radio Networks," International Journal of Communication Systems, Vol.23, No.5, 2010, pp.633-652.
  21. Changlong Chen, Min Song, Chunsheng Xin, Mansoor Alam, "A robust malicious user detection scheme in cooperative spectrum sensing," Global Communications Conference (GLOBECOM),2012 IEEE, pp. 4856–4861.
  22. Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou, Y. Thomas Hou, "Vulnerability and protection for distributed consensus based spectrum sensing in cognitive radio networks," 2012 Proceedings IEEE INFOCOM, 2012, pp. 900–908 (IEEE).
  23. Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proceedings of ACM MobiHoc, Urbana, IL, May, 2005, pp.46-57.
  24. Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang, "Channel Surfng and Spatial Retreats: Defenses Against Wireless Denial of Service," Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, PA, January, 2004, pp.80-89.
  25. Saman T. Zargar, Martin B.H, Weiss, Carlos E. Caicedo, James B.D. Joshi, "Security in Dynamic Spectrum Access Systems: A Survey," University of Pittsburgh, 2011, <http://d-scholarship.pitt.edu/2823/>.
  26. Deanna Hlavacek, J. Morris Chang, "A layered approach to cognitive radio network security: A survey,"Computer Networks 75 (2014) 414–436, Elsevier.
  27. Wenkai Wang, Husheng Li, Yan Sun, Zhu Han, "Attack proof collaborative spectrum sensing in cognitive radio networks," 43rd Annual Conference on Information Sciences and Systems,CISS 2009, pp. 130–134 (IEEE).
  28. Chris Karlof and David Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, Berkeley, CA, May, 2003, pp.113-127.
  29. Chetan Mathur and Koduvayur Subbalakshmi, "Security Issues in Cognitive Radio Networks," Cognitive Networks: Towards Self-Aware Networks, Wiley, New York, 2007, pp.284-293.
  30. A. Pandharipande et al., "IEEE P802.22 Wireless RANs: Technology Proposal Package for IEEE 802.22," IEEE 802.22 WG on WRANs, November, 2005
  31. Ruiliang Chen, Jung-Min Park, Y. Thomas Hou and Jeffrey H. Reed, "Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks," IEEE Communications Magazine, Vol.46, No.4, 2008, pp.50-55.
  32. Praveen Kaligineedi, Majid Khabbazian and Vijay K. Bhargava, "Secure Cooperative Sensing Techniques for Cognitive Radio Systems," IEEE International Conference on Communications 2008 (ICC ‘08), Beijing, China, May, 2008, pp.3406-3410.
  33. Ankit Rawat, Priyank Anand, Hao Chen and Pramod Varshney, "Countering Byzantine Attacks in Cognitive Radio Networks, 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP)," Dallas, TX, March, 2010, pp.3098-3101.
  34. Linjun Lu, Soo-Young Chang et al., "Technology Proposal Clarifications for IEEE 802.22 WRAN Systems," IEEE 802.22 WG on WRANs, March, 2006.
  35. Joerg Hillenbrand, Timo Weiss and Friedrich K. Jondral, "Calculation of Detection and False Alarm Probabilities in Spectrum Pooling Systems," IEEE Communication Letters, Vol.9, No.4, 2005, pp.349-351.
  36. Chris Karlof and David Wagner, "Secure Routing in Wireless Networks: Attacks and Countermeasures," Ad Hoc Networks, Vol.1, 2003, pp.293-315.
  37. J.R. Douceur, "The Sybil attack," Proceedings of 1st International Workshop on Peer to Peer Systems (IPTPS), Springer, 2002.
  38. Shameek Bhattacharjee, Shamik Sengupta, Mainak Chatterjee, "Vulnerabilities in cognitive radio networks: A survey" Computer Communications 36 (2013) 1387–1398, Elsevier.
  39. James Newsome, Elaine Shi, Dawn Song, Adrian Perrig, "The Sybil attack in sensor networks: analysis & defenses," Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, 2004, pp. 259–268 (ACM).
  40. Y.C. Hu, Adrian Perrig, and David B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," INFOCOM 2003. Twenty-Second Annual Joint Conferenceof the IEEE Computer and Communications, IEEE Societies, vol. 3, 2003, pp. 1976-1986 (IEEE).
  41. H.M. Qusay, D. MAHMOU, "Cognitive Networks: Towards Self-Aware Networks," Wiley, London, 2007.
  42. Olga León, Juan Hernandez-Serrano and Miguel Soriano, "A New Cross-Layer Attack to TCP in Cognitive Radio Networks," Proceedings of the 2nd International Workshop on Cross Layer Design (IWCLD ’09), Palma, Spain, June, 2009, pp.1-5.
  43. Juan Hernandez-Serrano, Olga León and Miguel Soriano, "Modeling the Lion Attack in Cognitive Radio Networks," EURASIP Journal on Wireless Communications and Networking, Vol.2011, Article ID 242304, 10 pages, 2011.
  44. Ning Jiang, Kien A. Hua, Danzhou Liu, "A scalable and robust approach to collaboration enforcement in mobile ad hoc networks," J. Communication Networks 9 (1) (2007) 56.
  45. Fahad Samad, "Securing Wireless Mesh Networks: A Three Dimensional Perspective," PhD thesis, University bibliothek, 2011.

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 308-327
Manuscript Number : CSEIT183169
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Aasia Rehman, Deo Prakash, "Study of Attacks and their Defence Methods in CRN : A Survey", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.308-327, January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT183169

Article Preview

Follow Us

Contact Us