Reference Hub2
Security for Cognitive Radio Networks

Security for Cognitive Radio Networks

Rajni Dubey, Sanjeev Sharma, Lokesh Chouhan
ISBN13: 9781466620056|ISBN10: 1466620056|EISBN13: 9781466620063
DOI: 10.4018/978-1-4666-2005-6.ch013
Cite Chapter Cite Chapter

MLA

Dubey, Rajni, et al. "Security for Cognitive Radio Networks." Cognitive Radio and Interference Management: Technology and Strategy, edited by Meng-Lin Ku and Jia-Chin Lin, IGI Global, 2013, pp. 238-256. https://doi.org/10.4018/978-1-4666-2005-6.ch013

APA

Dubey, R., Sharma, S., & Chouhan, L. (2013). Security for Cognitive Radio Networks. In M. Ku & J. Lin (Eds.), Cognitive Radio and Interference Management: Technology and Strategy (pp. 238-256). IGI Global. https://doi.org/10.4018/978-1-4666-2005-6.ch013

Chicago

Dubey, Rajni, Sanjeev Sharma, and Lokesh Chouhan. "Security for Cognitive Radio Networks." In Cognitive Radio and Interference Management: Technology and Strategy, edited by Meng-Lin Ku and Jia-Chin Lin, 238-256. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2005-6.ch013

Export Reference

Mendeley
Favorite

Abstract

Most of the frequency spectrum bands have already been licensed, and the licensed spectrum is not being utilized efficiently. Cognitive Radio Networks (CRNs) are the kind of full duplex radio that automatically altered its transmission or reception parameters, in such a way that the entire wireless communication network of which it is a node communicates efficiently, while avoiding interference with primary or secondary users. In this chapter, the authors introduce the concept of security threats that may pose a serious attack in CRN. Due to the unique characteristics of CRN, such network is highly vulnerable to security attacks compared to wireless network or infrastructure-based wireless network. The main objective of this chapter is to assist CR designers and the CR application engineers to consider the security factors in the early development stage of CR techniques. Challenges and various security issues are explored with respect to OSI (Open Systems Interconnection) reference model. Various possible and attacks are discussed broadly and respective solutions are also proposed by this chapter. Different architectures and models are also explained, and compared with the existing models.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.