21-01-2012, 01:29 PM
Security aspect in SDR and CR networks A survey and a way ahead
[attachment=16395]
1) (T16)Jamming of the channel used to distribute cognitive information
.The cognitive control channel used to distribute cognitive information is jammed.
. It affects robustness ,system integrity, spectrum sensing and spectrum sharing .
.PT: is based on frequency hopping
2) (T17)Malicious alteration of cognitive messages.
.The cognitive messages exchanged in the CR network are altered.
. It affects data integrity, spectrum sensing and spectrum sharing.
. PT: is based on trust and reputation, identification of the masquerading threats through signal analysis and authentification of CR nodes.
3)(T18)Masquerading of a primary user.
.An attacker mimics the primary user characteristic.
.selfish intention– keeping the resources for itself.
. malicious intention—denial of services.
. It affects system accountability ,spectrum sensing and spectrum mobility.
.PT: is based on trust and reputation, identification of the masquerading threats through signal analysis and authentification of CR nodes.