Anomalous Spectrum Usage Attack Detection in Cognitive Radio Wireless Networks

In many mission-critical applications such as military operations or disaster relief efforts, wireless networks employing dynamic spectrum access enabled by cognitive radio technology gain popularity due to their high spectrum efficiency and interoperability. However, the use of cognitive radio further complicates the security problems in wireless networks and introduces additional challenges. For instance, an attacker may mimic the behavior of a licensed primary user and disrupt the communication strategy of opportunistic spectrum usage of cognitive radio nodes, known as Primary User Emulation Attacks. Another example is a smart jammer, who can scan the spectrum and jam channels selectively.

Provided by: Institute of Electrical & Electronic Engineers Topic: Mobility Date Added: Dec 2011 Format: PDF

Find By Topic