z-logo
open-access-imgOpen Access
A Survey on Prevention of the Falsification Attacks on Cognitive Radio Networks
Author(s) -
. Pratibha,
Sharmelee Thangjam,
Naresh Kumar,
Sanjiv Kumar
Publication year - 2021
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/1033/1/012021
Subject(s) - cognitive radio , computer science , computer security , cognitive network , authentication (law) , computer network , interference (communication) , spectrum management , cognition , radio spectrum , telecommunications , wireless , channel (broadcasting) , neuroscience , biology
Today is the era of intelligent cognitive radio network technology that allows the utilization of available spectrum efficiently by allocation of the spectrum dynamically to unlicensed users. The technology utilizes the free spectrum bands which are not being used by the authorized users without causing any obstruction to the existing transmission. Cognitive radio technology promises interference free spectrum access by users. However, there exist many security attacks on spectrum impacting on spectrum access probability and network services. This will result in significant degradation of the performance of a cognitive radio network. This paper discusses the several attacks on different layers, their motives and various mechanisms to prevent them. The specific threats based on issues with configurability are explored on the basis of the related work. In this paper the role of authentication mechanism to prevent the attacks for hassle free spectrum utilization and its performance in resolving the cognitive network security issues are discussed. The need for effective sensing and decision mechanisms to enhance the security of cognitive networks is demonstrated in the paper. Hence, the presented paper gives an overview of existing research efforts at first and secondly, the research challenges are identified that can address the ways to secure the cognitive radio network and lastly the countermeasures in cognitive radio network security strategies are demonstrated.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here