Academic literature on the topic 'Cognitive radio networks – Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cognitive radio networks – Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cognitive radio networks – Security measures"

1

Ganesh, D., and T. Pavan Kumar. "A Survey onadvances in security threats and its counter measures in cognitive radio networks." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 372. http://dx.doi.org/10.14419/ijet.v7i2.8.10465.

Full text
Abstract:
Cognitive radio is a promising wireless communication technology that improves spectrum utilization and offers many benefits for internet users. Cognitive radio networks utilizes the available limited resources in a more efficient and flexible way. The main objective of the Cognitive network is to efficiently utilize the unutilized spectrum and meet the demand of the secondary users. some of the important features of cognitive of Cognitive radio networks are dynamic spectrum access, self organizing and flexibility. As Cognitive radio networks are flexible in nature, it will be effected by various security attacks which in turn affects the performance of the network. Furthermore Cognitive radio networks transmit the spectrum in several licensed bands and it also performs dynamic spectrum allocation. Cognitive radio and Cognitive radio networks are wireless in nature these face conventional attacks. In this survey we address various attacks in different layers , new threats and challenges that Cognitive networks face, current available solutions to address layer attacks. In addition applications, open problems and future Research challenges are also specified.
APA, Harvard, Vancouver, ISO, and other styles
2

Riza, Bob Subhan. "An Energy-Efficient Jamming Attacks Detection based on Cognitive Radio Networks." International Innovative Research Journal of Engineering and Technology 6, no. 2 (December 30, 2020): CS—37—CS—45. http://dx.doi.org/10.32595/iirjet.org/v6i2.2020.140.

Full text
Abstract:
5G wireless networks, primarily because of the device - to - device connections can enable huge networking. Dynamic bandwidth connectivity is a feature that enables device-to-device connections. Applications configured with cognitive radios must be authorized to reprocess the bandwidth consumed by cellular connections. The complex efficiency of the bandwidth allows cognitive consumers to switch between networks. In specific, switching contributes to energy efficiency, delay, and bandwidth connectivity. When the system is under the jamming attack, the computational cost much more. It is a major problem to fix jamming while ensuring an optimal level of operation. Thus, existing anti-jamming methods consider static users, this suggests preventive measures for wireless cognitive radio users in this paper and test them. The multivariate cumulative total was used in this study to classify suspicious activity like jamming attacks in Cognitive Radio Networks (CRN). Preventive-measures are being taken to resolve security risks to cognitive radio networks. The Intrusion Detection System (IDS) has been presented, including a way of preventing attacks on the cognitive radio network infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
3

Rath, Mamata. "Spectrum Access Issues and Security in Cognitive Radio Network." International Journal of Organizational and Collective Intelligence 9, no. 2 (April 2019): 31–44. http://dx.doi.org/10.4018/ijoci.2019040103.

Full text
Abstract:
Advanced cognitive radio networks (CRNs) are a promising technology. This network functions to solve the issue of scarcity of the radio spectrum by allocating the idle channels. It also carefully allocates the spectrum to unlicensed users in a balanced approach. The expediency of cognitive radio is highly reliant on fair and efficient supervision of the access to the idle portion of frequency channels. This is mainly executed by the network layer and media access control layer of the internet network model. There are various technical and communication issues while intelligently allocation spectrums to high priority and low priority channels. The current article performs a detailed analysis of such challenging issues and technical feasibility of implementing security measures in CRN applications in a systematic order. So, the problem statement of the current research article is a systematic analysis of channel access issues and their proposed solutions using improved protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Mohammed Abdul, Azeem, and Syed Umar. "Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 187. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp187-195.

Full text
Abstract:
<p>In the CRN (cognitive Radio Networks) the main issues to be addressed are spectrum scarcity and inadequate usage of spectrum. The CRN can analyse the unused spectrum, so that CRN users can easily occupy the unused spectrum without blocking the existing Primary Users. In a CRN, routing is a complex issue because of channel diversity. The existing system mainly focuses on the performance analysis of Ad hoc On-Demand Distance Vector (AODV) and the Weight Cumulative Expected transmission time (WCETT). The performance of these protocols are measured and compared in various ways such as the throughput of single radio station multi-channels, equal number of radio stations and channels, multi-radio stations multi-channels. The limitation with these protocols is, whenever a route fails, there is issue to get connected with the other nodes, the other being data integrity, which maintains the no loss of data [LOD]. In our proposed DIS – CRAHN system we overcome these limitations by adding data security and integrity. Security is provided using the RSA algorithm while Integrity is ensured using the SHA algorithm. With the data security we can maintain the shortest path from source to destination and if any route failure occurs then immediate route establishment can be done and data encryption and decryption also be implemented using the random key generation. Results show an improved performance in delay with reasonable throughput, making the protocol an ideal choice for CRNs.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Khasawneh, Mahmoud, and Anjali Agarwal. "A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3261058.

Full text
Abstract:
Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary nodes can threaten these spectrum sensing results by launching passive and active attacks that prevent legitimate nodes from using the spectrum efficiently. Securing the spectrum sensing process has become an important issue in CRNs in order to ensure reliable and secure spectrum sensing and fair management of resources. In this paper, a novel collaborative approach during spectrum sensing process is proposed. It monitors the behavior of sensing nodes and identifies the malicious and misbehaving sensing nodes. The proposed approach measures the node’s sensing reliability using a value called belief level. All the sensing nodes are grouped into a specific number of clusters. In each cluster, a sensing node is selected as a cluster head that is responsible for collecting sensing-reputation reports from different cognitive nodes about each node in the same cluster. The cluster head analyzes information to monitor and judge the nodes’ behavior. By simulating the proposed approach, we showed its importance and its efficiency for achieving better spectrum security by mitigating multiple passive and active attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Liang Xiao, Shan Kang, and Lianfen Huang. "Sensor-Assisted Security in Cognitive Radio Networks." Journal of Convergence Information Technology 8, no. 6 (March 31, 2013): 31–39. http://dx.doi.org/10.4156/jcit.vol8.issue6.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ren, Kui, Haojin Zhu, Zhu Han, and Radha Poovendran. "Security in cognitive radio networks [Guest Editorial]." IEEE Network 27, no. 3 (May 2013): 2–3. http://dx.doi.org/10.1109/mnet.2013.6523800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elkashlan, Maged, Lifeng Wang, Trung Q. Duong, George K. Karagiannidis, and Arumugam Nallanathan. "On the Security of Cognitive Radio Networks." IEEE Transactions on Vehicular Technology 64, no. 8 (August 2015): 3790–95. http://dx.doi.org/10.1109/tvt.2014.2358624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Hyunsung. "Privacy Preserving Security Framework for Cognitive Radio Networks." IETE Technical Review 30, no. 2 (2013): 142. http://dx.doi.org/10.4103/0256-4602.110553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhihui Shu, Yi Qian, and Song Ci. "On physical layer security for cognitive radio networks." IEEE Network 27, no. 3 (May 2013): 28–33. http://dx.doi.org/10.1109/mnet.2013.6523805.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cognitive radio networks – Security measures"

1

León, Abarca Olga. "Contributions to the security of cognitive radio networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/131053.

Full text
Abstract:
The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this context, Cognitive Radio (CR) technology has been proposed as a possible solution to reuse the spectrum being underutilized by licensed services. CRs are intelligent devices capable of sensing the medium and identifying those portions of the spectrum being unused. Based on their current perception of the environment and on that learned from past experiences, they can optimally tune themselves with regard to parameters such as frequency, coding and modulation, among others. Due to such properties, Cognitive Radio Networks (CRNs) can act as secondary users of the spectrum left unused by their legal owners or primary users, under the requirement of not interfering primary communications. The successful deployment of these networks relies on the proper design of mechanisms in order to efficiently detect spectrum holes, adapt to changing environment conditions and manage the available spectrum. Furthermore, the need for addressing security issues is evidenced by two facts. First, as for any other type of wireless network, the air is used as communications medium and can easily be accessed by attackers. On the other hand, the particular attributes of CRNs offer new opportunities to malicious users, ranging from providing wrong information on the radio environment to disrupting the cognitive mechanisms, which could severely undermine the operation of these networks. In this Ph.D thesis we have approached the challenge of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves not only providing countermeasures for existing attacks but also to identify new potential threats and evaluate their impact on CRNs performance. The main contributions of this thesis can be summarized as follows. First, a critical study on the State of the Art in this area is presented. A qualitative analysis of those threats to CRNs already identified in the literature is provided, and the efficacy of existing countermeasures is discussed. Based on this work, a set of guidelines are designed in order to design a detection system for the main threats to CRNs. Besides, a high level description of the components of this system is provided, being it the second contribution of this thesis. The third contribution is the proposal of a new cross-layer attack to the Transmission Control Protocol (TCP) in CRNs. An analytical model of the impact of this attack on the throughput of TCP connections is derived, and a set of countermeasures in order to detect and mitigate the effect of such attack are proposed. One of the main threats to CRNs is the Primary User Emulation (PUE) attack. This attack prevents CRNs from using available portions of the spectrum and can even lead to a Denial of Service (DoS). In the fourth contribution of this the method is proposed in order to deal with such attack. The method relies on a set of time measures provided by the members of the network and allows estimating the position of an emitter. This estimation is then used to determine the legitimacy of a given transmission and detect PUE attacks. Cooperative methods are prone to be disrupted by malicious nodes reporting false data. This problem is addressed, in the context of cooperative location, in the fifth and last contribution of this thesis. A method based on Least Median Squares (LMS) fitting is proposed in order to detect forged measures and make the location process robust to them. The efficiency and accuracy of the proposed methodologies are demonstrated by means of simulation.
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Talabani, Ali Mohammed Noori Hasan. "Enhancing physical layer security in cognitive radio networks." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/enhancing-physical-layer-security-in-cognitive-radio-networks(d9036158-5310-4292-b93d-f542354269a7).html.

Full text
Abstract:
A cognitive radio is an intelligent wireless communication system that improves spectrum utilisation by allowing secondary users to use the idle radio spectrum from primary licensed networks or to share the spectrum with primary users. Due to several significant challenges for cryptographic approaches of upper layers in protocol stacks | for example, private key management complexity and key transmission security issues | physical layer (PHY) security has drawn significant attention as an alternative for cryptographic approaches at the upper layers of the protocol stack. Security threats may arise from passive eavesdropping node(s), which try to intercept communications between authenticated nodes. Most recent studies consider information theoretic secrecy to be a promising approach. The idea of information theoretic secrecy lies in exploiting the randomness of communication channels to ensure the secrecy of the transmitted messages. Due to the constraints imposed on cognitive radio networks by secondary networks, allocating their resources in an optimal way is a key to maximising their achievable secrecy rates. Therefore, in this thesis, optimal resource allocation and secrecy rate maximisation of cognitive radio networks (CRNs) are proposed. Cooperative jamming is proposed to enhance the primary secrecy rate, and a new chaos-based cost function is introduced in order to design a power control algorithm and analyse the dynamic spectrum-sharing issue in the uplink of cellular CRNs. For secondary users as the game players in underlay scenarios, utility/cost functions are defined, taking into account the interference from and interference tolerance of the primary users. The existence of the Nash equilibrium is proved in this power control game, which leads to significantly lower power consumption and a relatively fast convergence rate when compared to existing game algorithms. The simulation results indicate that the primary secrecy rate is significantly improved by cooperative jamming, and the proposed power control algorithm achieves low power consumption. In addition, an integrated scheme with chaotic scrambling (CS), chaotic artificial noise, and a chaotic shift keying (CSK) scheme are proposed in an orthogonal frequency division multiplexing (OFDM)-based CR system to enhance its physical layer security. By employing the chaos-based third-order Chebyshev map to achieve the optimum bit error rate (BER) performance of CSK modulation, the proposed three-layer integrated scheme outperforms the traditional OFDM system in an overlay scenario with a Rayleigh fading channel. Importantly, under three layers of encryption that are based on chaotic scrambling, chaotic artificial noise, and CSK modulation, a large key size can be generated to resist brute-force attacks and eavesdropping, leading to a significantly improved security rate. Furthermore, a game theory-based cooperation scheme is investigated to enhance physical layer (PHY) security in both the primary and secondary transmissions of a cognitive radio network (CRN). In CRNs, the primary network may decide to lease its own spectrum for a fraction of time to the secondary nodes in exchange for appropriate remuneration. The secondary transmitter (ST) is considered to be a trusted relay for primary transmission in the presence of the ED. The ST forwards a message from the primary transmitter (PT) in a decode-and-forward (DF) fashion and, at the same time, allows part of its available power to be used to transmit an artificial noise (i.e., jamming signal) to enhance secrecy rates. In order to allocate power between the message and jamming signals, the optimisation problem is formulated and solved for maximising the primary secrecy rate (PSR) and secondary secrecy rate (SSR) with malicious attempts from a single eavesdropper or multiple eavesdroppers. Cooperation between the primary and secondary transmitters is also analysed from a game-theoretic perspective, and their interaction modelled as a Stackelberg game. This study proves theoretically and computes the Stackelberg equilibrium. Numerical examples are provided to illustrate the impact of the Stackelberg game-based optimisation on the achievable PSR and SSR. The numerical results indicate that spectrum leasing, based on trading secondary access for cooperation by means of relay and a jammer, is a promising framework for enhancing primary and secondary secrecy rates in cognitive radio networks when the ED can intercept both the primary and secondary transmission. Finally, this thesis focuses on physical-layer security in cognitive radio networks where multiple secondary nodes assist multiple primary nodes in combating unwanted eavesdropping from malicious eavesdroppers. Two scenarios are considered: a single eavesdropper (scenario I) and multiple eavesdroppers (scenario II). The secondary users act as a relay and jammer in scenario I, whereas they act only as a jammer in scenario II. Furthermore, the multiple eavesdroppers are distributed according to a homogenous Poison Point Process (PPP) in scenario II. Closed forms are derived for the outage probability and mean secrecy rate for both the primary and secondary transmissions. Furthermore, the scalability and convergence of the matching theory are proved. Both the analytical and numerical results show that the proposed matching model is a promising approach for exploiting the utility functions of both primary and secondary users.
APA, Harvard, Vancouver, ISO, and other styles
3

Yan, Qiben. "Security Enhanced Communications in Cognitive Networks." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/49704.

Full text
Abstract:
With the advent of ubiquitous computing and Internet of Things (IoT), potentially billions of devices will create a broad range of data services and applications, which will require the communication networks to efficiently manage the increasing complexity. Cognitive network has been envisioned as a new paradigm to address this challenge, which has the capability of reasoning, planning and learning by incorporating cutting edge technologies including knowledge representation, context awareness, network optimization and machine learning. Cognitive network spans over the entire communication system including the core network and wireless links across the entire protocol stack. Cognitive Radio Network (CRN) is a part of cognitive network over wireless links, which endeavors to better utilize the spectrum resources. Core network provides a reliable backend infrastructure to the entire communication system. However, the CR communication and core network infrastructure have attracted various security threats, which become increasingly severe in pace with the growing complexity and adversity of the modern Internet. The focus of this dissertation is to exploit the security vulnerabilities of the state-of-the-art cognitive communication systems, and to provide detection, mitigation and protection mechanisms to allow security enhanced cognitive communications including wireless communications in CRNs and wired communications in core networks. In order to provide secure and reliable communications in CRNs: emph{first}, we incorporate security mechanisms into fundamental CRN functions, such as secure spectrum sensing techniques that will ensure trustworthy reporting of spectrum reading. emph{Second}, as no security mechanism can completely prevent all potential threats from entering CRNs, we design a systematic passive monitoring framework, emph{SpecMonitor}, based on unsupervised machine learning methods to strategically monitor the network traffic and operations in order to detect abnormal and malicious behaviors. emph{Third}, highly capable cognitive radios allow more sophisticated reactive jamming attack, which imposes a serious threat to CR communications. By exploiting MIMO interference cancellation techniques, we propose jamming resilient CR communication mechanisms to survive in the presence of reactive jammers. Finally, we focus on protecting the core network from botnet threats by applying cognitive technologies to detect network-wide Peer-to-Peer (P2P) botnets, which leads to the design of a data-driven botnet detection system, called emph{PeerClean}. In all the four research thrusts, we present thorough security analysis, extensive simulations and testbed evaluations based on real-world implementations. Our results demonstrate that the proposed defense mechanisms can effectively and efficiently counteract sophisticated yet powerful attacks.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Changlong. "Robust and Secure Spectrum Sensing in Cognitive Radio Networks." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1383316543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.

Full text
Abstract:
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks---are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. In recent years, the operational aspects of CR networks have attracted great research interest. However, research on the security aspects of CR networks has been very limited. In this thesis, we discuss security issues that pose a serious threat to CR networks. Specifically, we focus on three potential attacks that can be launched at the physical or MAC layer of a CR network: primary user emulation (PUE) attack, spectrum sensing data falsification (SSDF) attack, and control channel jamming (CCJ) attack. These attacks can wreak havoc to the normal operation of CR networks. After identifying and analyzing the attacks, we discuss countermeasures. For PUE attacks, we propose a transmitter verification scheme for attack detection. The scheme utilizes the location information of transmitters together with their signal characteristics to verify licensed users and detect PUE attackers. For both SSDF attacks and CCJ attacks, we seek countermeasures for attack mitigation. In particular, we propose Weighted Sequential Probability Ratio Test (WSPRT) as a data fusion technique that is robust against SSDF attacks, and introduce a multiple-rendezvous cognitive MAC (MRCMAC) protocol that is robust against CCJ attacks. Using security analysis and extensive numerical results, we show that the proposed schemes can effectively counter the aforementioned attacks in CR networks.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
6

Sibomana, Louis. "Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints." Doctoral thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-11739.

Full text
Abstract:
The cognitive radio network (CRN) concept has been proposed as a solution to the growing demand and underutilization of the radio spectrum. To improve the radio spectrum utilization, CRN technology allows the coexistence of licensed and unlicensed systems over the same spectrum. In an underlay spectrum sharing system, secondary users (SUs) transmit simultaneously with the primary users (PUs) in the same frequency band given that the interference caused by the SU to the PU remains below a tolerable interference limit. Besides the transmission power limitation, a secondary network is subject to distinct channel impairments such as fading and interference from the primary transmissions. Also, CRNs face new security threats and challenges due to their unique cognitive characteristics.This thesis analyzes the performance of underlay CRNs and underlay cognitive relay networks under spectrum sharing constraints and security constraints. Distinct SU transmit power policies are obtained considering various interference constraints such as PU outage constraint or PU peak interference power constraint. The thesis is divided into an introduction and two research parts based on peer-reviewed publications. The introduction provides an overview of radio spectrum management, basic concepts of CRNs, and physical layer security. In the first research part, we study the performance of underlay CRNs with emphasis on a multiuser environment.In Part I-A, we consider a secondary network with delay-tolerant applications and analyze the ergodic capacity. Part I-B analyzes the secondary outage capacity which characterises the maximum data rate that can be achieved over a channel for a given outage probability. In Part I-C, we consider a secondary network with delay constrained applications, and derive expressions of the outage probability and delay-limited throughput. Part I-D presents a queueing model that provides an analytical tool to evaluate the secondary packet-level performance with multiple classes of traffic considering general interarrival and service time distributions. Analytical expressions of the SU average packet transmission time, waiting time in the queue, andtime spent in the system are provided.In the second research part, we analyze the physical layer security for underlay CRNs and underlay cognitive relay networks. Analytical expressions of the probability of non-zero secrecy capacity and secrecy outage probability are derived.Part II-A considers a single hop underlay CRN in the presence of multiple eavesdroppers (EAVs) and multiple SU-Rxs. In Part II-B, an underlay cognitive relay network in the presence of multiple secondary relays and multiple EAVs is studied.Numerical examples illustrate that it is possible to exploit the physical layer characteristics to achieve both security and quality of service in CRNs while satisfying spectrum sharing constraints.
APA, Harvard, Vancouver, ISO, and other styles
7

Bouallegue, Seifeddine. "Mobility and Security Management in Femtocell Networks." Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066084/document.

Full text
Abstract:
Les réseaux de télécommunications sont soumis à des processus d'amélioration et d'optimisation continue. Chaque nouvelle itération apporte son lot de défis et limites. En effet, la croissance exponentielle des appareils de télécommunication, des stations de base aux équipements utilisateurs conduisent à de sérieux problèmes d'economie d'énergie. En plus des menaces à la vie privée, en particulier pour les réseaux sans fil car les canaux utilisés par les opérateurs peuvent également être utilisés par une oreille indiscrète quelconque. L'optimisation de l'utilisation du spectre est également un défi en raison du fait que le spectre disponible dans les systèmes de communication sans fil est devenu une ressource très rare en raison de la demande croissante. Les réseaux émergents, tels que les femtocells, souffrent également des défis mentionnés précédemment. Le travail de thèse actuel se concentre sur la proposition de solutions aux défis cités précédemment: l'efficacité énergétique, le partage du spectre et la sécurité. Le travail de recherche présenté dans cette thèse a porté sur trois axes principaux: Premièrement, trouver un moyen de réduire au minimum la consommation d'énergie des femtocellules dans les reseaux BWA femto/macro-cellulaire en diminuant le nombre d'événements de mobilité non désirées et l'introduction de nouveaux états de puissance pour la femtocellule. En second lieu, proposer une solution qui vise à réduire le temps de transmission prévu dans le temps de séjour de l'utilisateur secondaire (SU) dans la couverture d'une femtocellule en utilisant un algorithme basé sur le temps minimum prévu de transmission dans le temps de séjour de l'équipement utilisateur (UE). Enfin, introduire un nouveau modèle qui basé sur la sélection du meilleur relais qui maximise le taux de confidentialité et les avantages de l'augmentation du nombre de relais sous la contrainte de qualité de service à la destination
Telecommunications networks are subject to continuous improvement and enhancement processes. Every new iteration brings its set of challenges and limitations. In fact, the exponential growth in telecommunication devices, from base stations to user equipments lead to serious energy efficiency issues. Along with the privacy threats, especially for wireless networks as the channels used by operators can also be used by any eavesdropper. Spectrum usage optimization is also a challenge due to the fact that the available spectrum in wireless communications systems has been a very rare resource because of the increasing demand. Emerging networks, such as femtocells, suffer also from the previously mentioned challenges. The current thesis work focuses on proposing several solutions to the previously cited challenges: energy efficiency, spectrum sharing and security. The research work introduced in this thesis has focused on three main axes: First, find a way to minimize the energy consumption of femtocells in macro/femto-cellular BWA networks by decreasing the number of unwanted mobility events and introducing new power states for the femtocell device. Second, propose a solution that aims to reduce the expected transmission time within the dwell time of Secondary User (SU) in the coverage of a femtocell using an algorithm based on the minimum expected transmission time within the dwell time of the User Equipment (UE) in the coverage of the femtocell. Finally, introduce a new scheme that is based on best relay selection method that maximizes the secrecy rate and benefits from increasing the number of relays under QoS constraint at the destination
APA, Harvard, Vancouver, ISO, and other styles
8

Chuku, Ejike E. "Security and Performance Engineering of Scalable Cognitive Radio Networks. Sensing, Performance and Security Modelling and Analysis of ’Optimal’ Trade-offs for Detection of Attacks and Congestion Control in Scalable Cognitive Radio Networks." Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/18448.

Full text
Abstract:
A Cognitive Radio Network (CRN) is a technology that allows unlicensed users to utilise licensed spectrum by detecting an idle band through sensing. How- ever, most research studies on CRNs have been carried out without considering the impact of sensing on the performance and security of CRNs. Sensing is essential for secondary users (SUs) to get hold of free band without interfering with the signal generated by primary users (PUs). However, excessive sensing time for the detection of free spectrum for SUs as well as extended periods of CRNs in an insecure state have adverse effects on network performance. Moreover, a CRN is very vulnerable to attacks as a result of its wireless nature and other unique characteristics such as spectrum sensing and sharing. These attacks may attempt to eavesdrop or modify the contents of packets being transmitted and they could also deny legitimate users the opportunity to use the band, leading to underutilization of the spectrum space. In this context, it is often challenging to differentiate between networks under Denial of Service (DoS) attacks from those networks experiencing congestion. This thesis employs a novel Stochastic Activity Network (SAN) model as an effective analytic tool to represent and study sensing vs performance vs security trade-offs in CRNs. Specifically, an investigation is carried out focusing on sensing vs security vs performance trade-offs, leading to the optimization of the spectrum band’s usage. Moreover, consideration is given either when a CRN experiencing congestion and or it is under attack. Consequently, the data delivery ratio (PDR) is employed to determine if the network is under DoS attack or experiencing congestion. In this context, packet loss probability, queue length and throughput of the transmitter are often used to measure the PDR with reference to interarrival times of PUs. Furthermore, this thesis takes into consideration the impact of scalability on the performance of the CRN. Due to the unpredictable nature of PUsactivities on the spectrum, it is imperative for SUs to swiftly utilize the band as soon as it becomes available. Unfortunately, the CRN models proposed in literature are static and unable to respond effectively to changes in service demands. To this end, a numerical simulation experiment is carried out to determine the impact of scalability towards the enhancement of nodal CRN sensing, security and performance. Atthe instant the band becomes idle and there are requests by SUs waiting for encryption and transmission, additional resources are dynamically released in order to largely utilize the spectrum space before the reappearance of PUs. These additional resources make the same service provision, such as encryption and intrusion detection, as the initial resources. To this end,SAN model is proposed in order to investigate the impact of scalability on the performance of CRN. Typical numerical simulation experiments are carried out, based on the application of the Mobius Petri Net Package to determine the performance of scalable CRNs (SCRNs) in comparison with unscalable CRNs (UCRNs) and associated interpretations are made.
APA, Harvard, Vancouver, ISO, and other styles
9

Jackson, David. "Exploiting Rogue Signals to Attack Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3072.

Full text
Abstract:
Cognitive radios are currently presented as the solution to the ever-increasing spectrum shortage problem. However, their increased capabilities over traditional radios introduce a new dimension of security threats. Cooperative Spectrum Sensing (CSS) has been proposed as a means to protect cognitive radio networks from the well known security threats: Primary User Emulation (PUE) and Spectrum Sensing Data Falsification (SSDF). I demonstrate a new threat to trust-based CSS protocols, called the Rogue Signal Framing (RSF) intrusion. Rogue signals can be exploited to create the illusion of malicious sensors which leads to the framing of innocent sensors and consequently, their removal from the shared spectrum sensing. Ultimately, with fewer sensors working together, the spectrum sensing is less robust for making correct spectrum access decisions. The simulation experiments illustrate the impact of RSF intrusions which, in severe cases, shows roughly 40\% of sensors removed. To mitigate the RSF intrusion's damage to the network's trust, I introduce a new defense based on community detection from analyzing the network's Received Signal Strength (RSS) diversity. Tests show a 95\% damage reduction in terms of removed sensors from the shared spectrum sensing, thus retaining the benefits of CSS protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

Lo, Brandon Fang-Hsuan. "Design and analysis of common control channels in cognitive radio ad hoc networks." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50323.

Full text
Abstract:
Common control channels in cognitive radio (CR) ad hoc networks are spectrum resources temporarily allocated and commonly available to CR users for control message exchange. With no presumably available network infrastructure, CR users rely on cooperation to perform spectrum management functions. One the one hand, CR users need to cooperate to establish common control channels, but on the other hand, they need to have common control channels to facilitate such cooperation. This control channel problem is further complicated by primary user (PU) activities, channel impairments, and intelligent attackers. Therefore, how to reliably and securely establish control links in CR ad hoc networks is a challenging problem. In this work, a framework for control channel design and analysis is proposed to address control channel reliability and security challenges for seamless communication and spectral efficiency in CR ad hoc networks. The framework tackles the problem from three perspectives: (i) responsiveness to PU activities: an efficient recovery control channel method is devised to efficiently establish control links and extend control channel coverage upon PU's return while mitigating the interference with PUs, (ii) robustness to channel impairments: a reinforcement learning-based cooperative sensing method is introduced to improve cooperative gain and mitigate cooperation overhead, and (iii) resilience to jamming attacks: a jamming-resilient control channel method is developed to combat jamming under the impacts of PU activities and spectrum sensing errors by leveraging intrusion defense strategies. This research is particularly attractive to emergency relief, public safety, military, and commercial applications where CR users are highly likely to operate in spectrum-scarce or hostile environment.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cognitive radio networks – Security measures"

1

Beibei, Wang, ed. Cognitive radio networking and security: A game-theoretic view. Cambridge: Cambridge University Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Ning, and Jon W. Mark. Security-aware Cooperation in Cognitive Radio Networks. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-0413-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yan. Security in RFID and sensor networks. Boca Raton: Auerbach Publications, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Advanced security and privacy for RFID technologies. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

International Conference on Anti-Counterfeiting, Security, and Identification (2nd 2008 Guiyang, China). Proceedings of the 2nd international conference on anti-counterfeiting, security, and identification: 2008 ASID. [Piscataway, N.J: IEEE], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Conference on Anti-Counterfeiting, Security, and Identification (2nd 2008 Guiyang, China). Proceedings of the 2nd international conference on anti-counterfeiting, security, and identification: 2008 ASID. [Piscataway, N.J: IEEE], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

IEEE International Workshop on Anti-Counterfeiting, Security, Identification (2007 Xiamen Shi, China). 2007 International Workshop on Anti-counterfeiting, Security, Identification: Xiamen, China, 16-18 April 2007. Piscataway, N.J: IEEE, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Camenisch, Jan. Open Research Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers. Berlin, Heidelberg: IFIP International Federation for Information Processing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

International, Conference on Anti-Counterfeiting Security and Identification (3rd 2009 Hong Kong China). Proceedings of the 3rd international conference on anti-counterfeiting, security, and identification in comunication: 2009 ASID : August 20-22, 2009, City University of Hong Kong, Hong Kong, China. [Piscataway, N.J: IEEE], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cognitive radio networks – Security measures"

1

Zhang, Ning, and Jon W. Mark. "Cooperative Cognitive Radio Networking." In Security-aware Cooperation in Cognitive Radio Networks, 15–22. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Safdar, Ghazanfar A. "Cognitive Radio Networks: Sensing, Access, Security." In LTE-Advanced and Next Generation Wireless Networks, 443–72. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781118410998.ch16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

He, Xiaoli, Hong Jiang, Yu Song, and He Xiao. "Optimal Resource Allocation for Underlay Cognitive Radio Networks." In Cloud Computing and Security, 358–71. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mapunya, Sekgoari, and Mthulisi Velempini. "Investigating Spectrum Sensing Security Threats in Cognitive Radio Networks." In Ad Hoc Networks, 60–68. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74439-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sengupta, Shamik, Santhanakrishnan Anand, and Rajarathnam Chandramouli. "Self-Coexistence and Security in Cognitive Radio Networks." In Convergence of Mobile and Stationary Next-Generation Networks, 385–405. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2010. http://dx.doi.org/10.1002/9780470630976.ch13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Murmu, Mahendra Kumar, and Awadhesh Kumar Singh. "Security Issues in Cognitive Radio Ad Hoc Networks." In Handbook of Computer Networks and Cyber Security, 247–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-22277-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Ning, and Jon W. Mark. "Introduction." In Security-aware Cooperation in Cognitive Radio Networks, 1–13. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Ning, and Jon W. Mark. "Trust-Aware Cooperative Networking." In Security-aware Cooperation in Cognitive Radio Networks, 23–42. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Ning, and Jon W. Mark. "Cooperative Networking for Secure Communications." In Security-aware Cooperation in Cognitive Radio Networks, 43–68. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Ning, and Jon W. Mark. "Concluding Remarks." In Security-aware Cooperation in Cognitive Radio Networks, 69–70. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cognitive radio networks – Security measures"

1

Akin, Sami. "Security in cognitive radio networks." In 2014 48th Annual Conference on Information Sciences and Systems (CISS). IEEE, 2014. http://dx.doi.org/10.1109/ciss.2014.6814188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boubiche, Djallel Eddine. "Cognitive Radio Sensor Networks." In IPAC '15: International Conference on Intelligent Information Processing, Security and Advanced Communication. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2816839.2852765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Xueying, and Cheng Li. "The security in cognitive radio networks." In the 2009 International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1582379.1582447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yuan, Gaochao Xu, and Xiaozhong Geng. "Security Threats in Cognitive Radio Networks." In 2008 10th IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2008. http://dx.doi.org/10.1109/hpcc.2008.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Parvin, Sazia, Song Han, Farookh Khadeer Hussain, and Md Abdullah Al Faruque. "Trust based security for cognitive radio networks." In the 12th International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1967486.1967605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Trubin, I. S. "Security Threats in Mobile Cognitive Radio Networks." In 2018 IEEE East-West Design & Test Symposium (EWDTS). IEEE, 2018. http://dx.doi.org/10.1109/ewdts.2018.8524808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sumathi, A. C., and R. Vidhyapriya. "Security in cognitive radio networks - a survey." In 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2012. http://dx.doi.org/10.1109/isda.2012.6416522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Slimeni, Feten, Bart Scheers, and Zied Chtourou. "Security threats in military cognitive radio networks." In 2015 International Conference on Military Communications and Information Systems (ICMCIS). IEEE, 2015. http://dx.doi.org/10.1109/icmcis.2015.7158714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Soysa, Madushanka, Pamela C. Cosman, and Laurence B. Milstein. "Video cognitive radio networks for tactical scenarios." In 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhu, Li, and Huaqing Mao. "Unified Layered Security Architecture for Cognitive Radio Networks." In 2011 Asia-Pacific Power and Energy Engineering Conference (APPEEC). IEEE, 2011. http://dx.doi.org/10.1109/appeec.2011.5748846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography