首页> 外文会议>IEEE International Conference on Application of Information and Communication Technologies >Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks
【24h】

Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks

机译:认知无线电(CR)网络安全漏洞和威胁评估分析

获取原文

摘要

Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR) has attempted to minimize this problem by allowing secondary users to coexist with primary users without causing interference to their communication through dynamic utilization of free spectrum. CR offers many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. It is anticipated that CR technology will be the next wave of innovation in information and communications technologies. Although operational aspects of CR are being explored vigorously, its security aspects have gained little attention. Due to the dynamic nature of CR networks and the fact that they exposed relatively more to wireless networks, entirely new classes of security threats and challenges are introduced, such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. To achieve successful deployment of CR technologies in practice, there is a critical need to advance the theoretical understanding of these entirely new classes of security threats and challenges. Therefore, in this paper, our primary objective is to identify and investigate the major known security threats within a CR network (CRN). Our secondary objective is to highlight on how potential threats exploit the vulnerabilities present at different layers of a communication stack.
机译:无线通信最新进步正在每天创建频谱短缺问题。最近,认知无线电(CR)已经尝试通过允许辅助用户与主要用户共存而不通过自由频谱的动态利用而对其通信进行干扰来最小化该问题。 CR提供许多有前途的好处,包括动态频谱共享,强大的跨层适配和协作网络。预计CR技术将成为信息和通信技术的下一波创新浪潮。虽然CR的运营方面正在大力探讨,但其安全方面的关注很少。由于CR网络的动态性质以及它们对无线网络相对较多的事实,引入了全新的安全威胁和挑战,例如许可的用户仿真,自私行为者和未经授权使用频谱频带。为实现在实践中成功部署CR技术,需要推进对这些完全新的安全威胁和挑战的理论理解。因此,在本文中,我们的主要目标是识别并调查CR网络(CRN)内的主要已知的安全威胁。我们的二级目标是突出潜在威胁如何利用通信堆栈不同层的漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号