Computer Science ›› 2014, Vol. 41 ›› Issue (5): 8-13.doi: 10.11896/j.issn.1002-137X.2014.05.002

Previous Articles     Next Articles

Survey towards Cognitive Ability Guarantee in Cognitive Radio Networks

FENG Guang-sheng,ZHENG Chen,WANG Hui-qiang,ZHAO Qian and LV Hong-wu   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Cognitive radio network can sense wireless environment and then uses spectrum white holes in an opportunistic manner through dynamic spectrum access technology.Cognitive ability is an essential attribute of cognitive radio network,therefore the safety guarantee of cognitive ability is directly related to the practical process in cognitive radio networks.Cognitive ability is faced various security threats due to the complexity of cognitive radio network architecture and node mobility issues.Cognitive ability security issues and corresponding solutions were introduced from the aspects of cognitive communication,resources sensing,inference decision,and services fit,and then the shortages and weaknesses of the existing solutions were summarized.Development tendencies on cognitive ability guarantee were proposed afterwards based on trust mechanism.Problems and challenges faced by cognitive ability guarantee as well as a discussion on the future research topics were referred to at last.

Key words: Cognitive radio network,Cognitive ability,Cognitive communication,Resources sensing,Services fit

[1] 薛楠,周贤伟,周健.认知无线电网络诱骗攻击问题及安全解决方案[J].电信科学,2009,25(5):81-87
[2] 黑永强,李晓辉,李文涛.认知网络中的多用户MIMO线性协作频谱感知问题研究[J].通信学报,2012,33(3):45-52
[3] 刘全,高俊,郭云玮,等.抗SSDF攻击的一致性协作频谱感知方案[J].电子学报,2011,39(11):2643-2648
[4] 曾昆,彭启航,唐友喜.基于信任节点辅助的安全协同频谱感知策略[J].信号处理,2011,27(4):486-491
[5] 贺倩,冯志勇,张平.基于人工智能技术的认知无线网络重构决策算法[J].通信学报,2012,33(7):96-102
[6] Fragkiadakis A G,Tragos E Z,Askoxylakis I G.A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks[J].Communications Surveys & Tutorials,IEEE,2013,15(1):428-445
[7] Vien Q T,Stewart B G,Tianfield H,et al.Efficient cooperative spectrum sensing for three-hop cognitive wireless relay networks[J].Communications,IET,2013,7(2):199-127
[8] Zhang Xing,Xing Jia,Yan Z,et al.Outage performance study of cognitive relay networks with imperfect channel knowledge[J].IEEE Communications Letters,2013,17(1):27-30
[9] Kumar R N,Bapuji V,Govardhan A,et al.An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS)[J].Computer Engineering and Intelligent Systems,2012,3(7):62-70
[10] León O,Hernández-Serrano J,Soriano M.Securing cognitive radio networks[J].International Journal of Communication Systems,2010,23(5):633-652
[11] Reddy K G,Thilagam P S.Intrusion Detection technique forwormhole and following jellyfish and byzantine attacks in wireless mesh network[J].Advanced Computing,Networking and Security,2012,7135:631-637
[12] Wang B,Wu Y,Liu K R,et al.An anti-jamming stochastic game for cognitive radio networks[J].IEEE Journal on Selected Areas in Communications,2011,29(4):877-889
[13] Wu Y,Wang B,Liu K,et al.Anti-jamming games in multi-channel cognitive radio networks[J].IEEE Journal on Selected Areas in Communications,2012,30(1):4-15 (下转第19页)(上接第13页)
[14] Asterjadhi A,Zorzi M.JENNA:a jamming evasive network-coding neighbor-discovery algorithm for cognitive radio networks [Dynamic Spectrum Management][J].Wireless Communications,IEEE,2010,17(4):24-32
[15] Zhang Lu,Pei Qing-qi,Li Hong-ning.Anti-jamming SchemeBased on Zero Pre-shared Secret in Cognitive Radio Network[C]∥Proceedings of Computational Intelligence and Security (CIS),2012Eighth International Conference on.Guangzhou,China,2012:670-673
[16] 聂晓文,卢显良,唐晖,等.基于洗牌策略的Sybil攻击防御[J].电子学报,2008(11):2144-2149
[17] 陈珊珊,杨庚,陈生寿.基于LEACH协议的Sybil攻击入侵检测机制[J].通信学报,2011,32(8):143-149
[18] Yu Bo,Xu Cheng-zhong,Xiao Bin.Detecting Sybil attacks inVANETs[J].Journal of Parallel and Distributed Computing,2013,73(6):746-756
[19] Kumar R N,Bapuji V,Govardhan A,et al.An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS)[J].Computer Engineering and Intelligent Systems,2012,3(7):62-70
[20] El Zoghby N,Cherfaoui V,Ducourthial B,et al.Distributed Data Fusion for Detecting Sybil Attacks in VANETs[M]∥Belief Functions:Theory and Applications.Springer Berlin Heidelberg,2012:351-358
[21] Chen Ze-sheng,Todor C,Chen Chao,et al.Modeling primary user emulation attacks and defenses in cognitive radio networks[C]∥Proceedings of 2009IEEE 28th International Performance Computing and Communications Conference (IPCCC).Scottsdale,AZ,2009:208-215
[22] Jin Z,Anand S,Subbalakshmi K.Detecting primary user emulation attacks in dynamic spectrum access networks[C]∥Procee-dings of 2009IEEE International Conference on Communications(ICC’09).Dresden,German,2009:1-5
[23] Jin Z,Anand S,Subbalakshmi K.Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing[J].ACM SIGMOBILE Mobile Computing and Communications Review,2009,13(2):74-85
[24] Liu Y,Ning P,Dai H.Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures[C]∥Proceedings of 2010IEEE Symposium on Security and Privacy (SP).Oakland,CA,USA,2010:286-301
[25] Wang Wen-kai,Li Hu-sheng,Sun Y L,et al.Attack-proof collaborative spectrum sensing in cognitive radio networks[C]∥Proceedings of the 43rd Annual Conference on Information Sciences and Systems(CISS 2009).Baltimore,MD,2009:130-134
[26] Zhu F,Seo S-W.Enhanced robust cooperative spectrum sensing in cognitive radio[J].Journal of Communications and Networks,2009,11(2):122-133
[27] Min A W,Shin K G,Hu Xin.Attack-tolerant distributed sensingfor dynamic spectrum access networks[C]∥Proceedings of 17th IEEE International Conference on Network Protocols(ICNP 2009).Princeton,NJ,2009:294-303
[28] Chen Rui-liang,Park Jung-min,Bian Kai-gui.Robust distributed spectrum sensing in cognitive radio networks[C]∥Proceedings of the 27th IEEE Conference on Computer Communications(INFOCOM 2008).Phoenix,AZ,2008:1876-1884
[29] Chen R,Park J-M J,Bian K.Robustness against byzantine fai-lures in distributed spectrum sensing[J].Computer Communications,2012,35(17):2115-2124
[30] Rawat A S,Anand P,Chen Hao,et al.Countering byzantine attacks in cognitive radio networks[C]∥Proceedings of 2010IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP).Dallas,TX,2010:3098-3101
[31] Nguyen-Thanh N,Koo I.An enhanced cooperative spectrumsensing scheme based on evidence theory and reliability source evaluation in cognitive radio context[J].Communications Letters,IEEE,2009,13(7):492-494
[32] Li Hu-sheng,Han Zhu.Catching attacker (s) for collaborative spectrum sensing in cognitive radio systems:An abnormality detection approach[C]∥Proceedings of 2010IEEE Symposium on New Frontiers in Dynamic Spectrum.Singapore,2010:1-12
[33] Tang H,Yu F R,Huang M,et al.Distributed consensus-basedsecurity mechanisms in cognitive radio mobile ad hoc networks[J].IET Communications,2012,6(8):974-983
[34] Zhang Yong-guang,Lee Wen-ke.Intrusion detection in wireless ad-hoc networks[C]∥Proceedings of the 6th annual international conference on Mobile computing and networking.ACM.New York,NY,USA,2000:275-283
[35] Pei Q,Li H,Ma J,et al.Defense against objective function attacks in cognitive radio networks[J].Chinese Journal of Electronics,2011,20(4):138-142
[36] Rathnayake U,Petander H,Ott M,et al.EMUNE:architecturefor mobile data transfer scheduling with network availability predictions[J].Mob.Netw.Appl.,2012,17(2):216-233
[37] Hernandez-Serrano J,León O,Soriano M.Modeling the lion at-tack in cognitive radio networks[J].EURASIP Journal on Wireless Communications and Networking,2011,2011:1-10

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!