A Study on Techniques/Algorithms used for Detection and Prevention of Security Attacks in Cognitive Radio Networks
Abstract
In this paper a detailed survey is carried out on the taxonomy of Security Issues, Advances on Security Threats and Countermeasures ,A Cross-Layer Attack, Security Status and Challenges for Cognitive Radio Networks, also a detailed survey on several Algorithms/Techniques used to detect and prevent SSDF(Spectrum Sensing Data Falsification) attack a type of DOS (Denial of Service) attack and several other Network layer attacks in Cognitive Radio Network or Cognitive Radio Wireless Sensor Node Networks(WSNN’s) to analyze the advantages and disadvantages of those existing algorithms/techniques.
Keywords
References
. ‘The Design of a Defense Mechanism to Mitigate the Spectrum Sensing Data Falsification attack in Cognitive Radio Ad Hoc Networks’,2016 IEEE.
. A.Hyils Sharon Magdalene, Dr. L. Thulasimani,Fuzzy Clustering Means (FCM) for mitigating Spectrum sensing data falsification (SSDF) attack in Cognitive Radio Networks ‘, 2017 IEEE International Conference on Computational Intelligence and Computing Research.
. Abbas Ali Sharifi and Mir JavadMuseviNiya, Member, IEEE, ‘Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach’, IEEE COMMUNICATIONS LETTERS, VOL. 20, NO. 1, JANUARY 2016 .
. Alireza Attar, Helen Tang, Senior Member IEEE, Athanasios V. Vasilakos, Senior Member IEEE, F. Richard Yu, Senior Member IEEE, and Victor C. M. Leung,Fellow IEEE, ‘A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions’, Proceedings of the IEEE | Vol. 100, No. 12, December 2012 0018-9219.
. Anil Kumar and Dr. Rajendra Kumar, ‘Simulation Analysis of GLRT and Eigenvalue Based Methods for Cognitive Radio’, 2017 2ndIEEE International Conference On Recent Trends in Electronics Information & Communication Technology (RTEICT), May 19-20, 2017, India.
. EI Qingqi, LI Hongning and LIU Xianjun , ‘Neighbor Detection-Based Spectrum Sensing Algorithm in Distributed Cognitive Radio Networks’, Chinese Journal of Electronics Vol.26, No.2, Mar. 2017.
. Fang Ye and Xun Zhang, ‘Evidence-theory-based Collaborative Spectrum Sensing with Efficient reditability Evaluation in Cognitive Radio Networks’, 2017 Progress In Electromagnetics Research Symposium — Fall (PIERS — FALL), Singapore, 19–22 November.
. GUANGMING NIE, GUORU DING (Senior Member, IEEE), LINYUAN ZHANG, AND QIHUI WU , (Senior Member, IEEE) , ‘Byzantine Defense in Collaborative Spectrum Sensing via Bayesian Learning’.
. HeadarTarshBatool, Dr. R.S.Kawitkar, ‘Performance Investigation of Insistent Spectrum Sensing Data Falsification on Cognitive Radio Networks’,Proceedings of the Second International Conference on Intelligent Computing and Control Systems (ICICCS 2018).
. Huifang Chen, Member, IEEE, Ming Zhou, Lei Xie, Member, IEEE, and Jie Li, Senior Member, IEEE, ‘Cooperative Spectrum Sensing With M-Ary Quantized Data in Cognitive Radio Networks Under SSDF Attacks’,IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 8, AUGUST 2017.
. Huifang Chen, Member, IEEE, Ming Zhou, Lei Xie, Member, IEEE, Kuang Wang, and Jie Li, Senior Member, IEEE, ‘Joint Spectrum Sensing and Resource Allocation Scheme in Cognitive Radio Networks with Spectrum Sensing Data Falsification Attack’,IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 11, NOVEMBER 2016.
. Ismail K. Ahmed and Abraham O. Fapojuwo, ‘Security Threat Assessment of Simultaneous Multiple Denial–of–Service Attacks in IEEE 802.22 Cognitive Radio Networks’, 2016 IEEE.
. IssahNgomane, MthulisiVelempini, SabeloVelemseniDlamini, ‘ Trust-based System to Defend Against the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Network’, 2018 IEEE.
. Izhar Ahmed Sohu , Asif Ahmed Rahimoon, Amjad Ali junejo, Sadam Hussain junejo,Arsalan Ahmed Sohu ‘Analogous Study of Security Threats in Cognitive Radio’, International Conference on Computing, Mathematics and Engineering Technologies – iCoMET 2019.
. Ji Wang,Ing-Ray Chen, Jeffrey J.P, Ding-Chau Wang, ‘SSDF Attacks in Distributed Cognitive Radio Networks’ .
. Jianwu, FENG Zhiyong, ZHANG Ping,‘A Survey of Security Issues in Cognitive Radio Networks’, Beijing University of Posts and Telecommunications, Beijing 100876, China.
. JIANXIN DAI , JUAN LIU, CUNHUA PAN , JIANGZHOU WANG, (Fellow, IEEE), CHONGHU CHENG, and ZHILIANG HUANG, ‘ MAC Based Energy Efficiency in Cooperative Cognitive Radio Network in the Presence of Malicious Users’, 2169-3536- 2018 IEEE,Digital Object Identifier 10.1109/ACCESS.2018.2793906.
. John Kelly, Jonathan Ashdown , ‘Spectrum Sensing Falsification Detection in Dense Cognitive Radio Networks using a Greedy Method’, Air Force Research Laboratory (AFRL) Information Directorate Rome, 2019.
. Jun Wu, Tiecheng Song, Cong Wang, Yue Yu, Miao Liu, Jing Hu , ‘Robust Cooperative Spectrum Sensing Against Probabilistic SSDF Attack in Cognitive Radio Networks’, National Mobile Communication Research Lab Southeast University, Nanjing, China.
. Jun Wu, Xi Li, Tiecheng Song, Lei Zhang, Miao Liu, Jing Hu, ‘Two-stage Credit Threshold on Cooperative Spectrum Sensing to Exclude Malicious Users in Mobile Cognitive Radio Networks’, National Mobile Communication Research Lab Southeast University, Nanjing, China.
. Lanka Sejaphala, MthulisiVelempini, SabeloVelemseniDlamini ‘HCOBASAA: Countermeasure Against Sinkhole Attacks in Software-Defined Wireless Sensor Cognitive Radio Network’, 2018 IEEE.
. Linyuan Zhang, Guoru Ding, Member, IEEE, Qihui Wu, Senior Member, IEEE, Yulong Zou, Senior Member, IEEE, Zhu Han, Fellow, IEEE, and Jinlong Wang, Senior Member, IEEE, ‘Byzantine Attack and Defense in Cognitive Radio Networks: A Survey’.
. Moinul Hossain and Jiang Xie, ‘Off-sensing and Route Manipulation Attack: A Cross-Layer Attack in Cognitive Radio based Wireless Mesh Networks’, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
. Natasha Saini, Nitin Pandey, Ajeet Pal Singh, ‘Analyzing and Developing Security Techniques for Worms in Cognitive Networks’, 2016 IEEE International Conference on Computational Intelligence and Computing Research.
. Natasha, Nitin Pandey, Ajeet Pal Singh, ‘Formal Approach to Security Techniques in Cognitive Networks’, 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).
. Networks RoshniRajkumari and NingrinlaMarchang, Member, IEEE, ‘Secure Non-Consensus Based Spectrum Sensing in Non-Centralized Cognitive Radio’, IEEE SENSORS JOURNAL, VOL. 18, NO. 9, MAY 1, 2018.
. Ohrid, Macedonia Pujue Wang, Cailian Chen, Shanying Zhu, Ling Lyu, Weidong Zhang, and Xinping Guan, ‘An Optimal Reputation-based Detection against SSDF Attacks in Industrial Cognitive Radio Network’, 2017 13th IEEE International Conference on Control & Automation (ICCA) July 3-6, 2017.
. PinakiSankar Chatterjee,Monideepa Roy, ‘Lightweight cloned-node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs’,IET Wirel. Sens. Syst., 2018, Vol. 8 Iss. 3, pp. 121-128 © The Institution of Engineering and Technology 2018.
. Ping Bai, Xun Zhang, and Fang Ye, ‘Reputation-based Beta Reputation System against SSDF Attack in Cognitive Radio Networks’, 2017 Progress In Electromagnetics Research Symposium — Fall (PIERS — FALL), Singapore, 19–22 November.
. Rajesh K. Sharma, Member, IEEE, and Danda B. Rawat, Senior Member, IEEE, ‘Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey’, IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 17, NO. 2, SECOND QUARTER 2015.
. Ramesh babu B, MeenakshiTripathi , Manoj Singh Gaur, Dinesh Gopalani, Dharm Singh Jat, ‘Cognitive Radio Ad-Hoc Networks: Attacks and Its Impact’.
. RuiyanDu , Ying Zhou, Fulai Liu, Xinwei Wang, ‘An Effective Collaborative Spectrum Sensing Method against SSDF Attack’, 2017 IEEE.
. SasaMaric, Leonardo Goratti ‘ A Simple and Highly Effective SSDF attacks Mitigation Method’, 2016 IEEE.
. ShikhamoniNath, NingrinlaMarchang and Amar Taggu, ‘Mitigating SSDF Attack using K-Medoids Clustering in Cognitive Radio Networks’, 2015 Eight International Workshop on Selected Topics in Mobile and Wireless Computing.
. Shuai Yuan, Lei Li and ChunxiaoChigan, ‘On MMD-based Secure Fusion Strategy for Robust Cooperative Spectrum Sensing’, DOI 10.1109/TCCN.2019.2906236, IEEE Transactions on Cognitive Communications and Networking.
. SuchismitaBhattacharjee, RaipingKeitangnao, NingrinlaMarchang, ‘Association Rule Mining for Detection of Colluding SSDF Attack in Cognitive Radio Networks’, 2016 International Conference on Computer Communication and Informatics (ICCCI -2016), Jan. 07 – 09, 2016, Coimbatore, INDIA.
. Sukanya Chatterjee, Pinaki S Chatterjee A Comparison based Clustering Algorithm to Counter SSDF attack in CWSN. 2015 International Conference on Computational Intelligence & Networks.
. Ting Peng, Yuebin Chen, JieXiao,Yang Zheng, Jiangfeng Yang, ‘ Improved Soft Fusion-Based Cooperative Spectrum Sensing Defense Against SSDF Attacks’, 2016 IEEE.
. Xuekang Sun, Rikang Zhou, Hongxing Wu, Li Gao,Yuyan Zhang, ‘Angle based Malicious User Detection for Wideband Cognitive Radio Network’, The 20th International Symposium on Wireless Personal Multimedia Communications (WPMC-2017).
. Yasir Al-Mathehaji, Said Boussakta, Martin Johnston, and HarithFakhrey,‘Defeating SSDF Attacks With Trusted Nodes Assistance in Cognitive Radio Networks’ July 19, 2017.
. Yu Gan, Chunxiao Jiang, Senior Member, IEEE, Norman C. Beaulieu, Fellow, IEEE, Jian Wang, Member, IEEE, and Yong Ren, Senior Member, IEEE, ‘Secure Collaborative Spectrum Sensing: A Peer-Prediction Method’,IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016.
. Zhixu Cheng, Tiecheng Song, Jing Zhang, Jing Hu, Yazhou Hu, Lianfeng Shen, Xi Li, Jun Wu, ‘Self-Organizing Map-Based Scheme Against Probabilistic SSDF Attack in Cognitive Radio Networks’, National Mobile Communications Research Laboratory, Southeast University Nanjing, Jiangsu, 210096, China.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.