Spectrum Sensing and Security Challenges and Solutions: Contemporary Affirmation of the Recent Literature
Spectrum Sensing and Security Challenges and Solutions: Contemporary Affirmation of the Recent Literature
Article PDF

Keywords

cognitive radio network
secure spectrum sensing
mobility and trust
cognitive radio
symmetric cryptographic key generation
LT code

How to Cite

Shribala Nagul, Dr. Srihari, & Dr. B C Jinaga. (2014). Spectrum Sensing and Security Challenges and Solutions: Contemporary Affirmation of the Recent Literature. Global Journal of Computer Science and Technology, 14(E5), 33–45. Retrieved from https://gjcst.com/index.php/gjcst/article/view/1262

Abstract

Cognitive radio CR has been recently proposed as a promising technology to improve spectrum utilization by enabling secondary access to unused licensed bands A prerequisite to this secondary access is having no interference to the primary system This requirement makes spectrum sensing a key function in cognitive radio systems Among common spectrum sensing techniques energy detection is an engaging method due to its simplicity and efficiency However the major disadvantage of energy detection is the hidden node problem in which the sensing node cannot distinguish between an idle and a deeply faded or shadowed band Cooperative spectrum sensing CSS which uses a distributed detection model has been considered to overcome that problem On other dimension of this cooperative spectrum sensing this is vulnerable to sensing data falsification attacks due to the distributed nature of cooperative spectrum sensing As the goal of a sensing data falsification attack is to cause an incorrect decision on the presence absence of a PU signal malicious or compromised SUs may intentionally distort the measured RSSs and share them with other SUs Then the effect of erroneous sensing results propagates to the entire CRN This type of attacks can be easily launched since the openness of programmable software defined radio SDR devices makes it easy for malicious or compromised SUs to access low layer protocol stacks such as PHY and MAC However detecting such attacks is challenging due to the lack of coordination between PUs and SUs and unpredictability in wireless channel signal propagation thus calling for efficient mechanisms to protect CRNs Here in this paper we attempt to perform contemporary affirmation of the recent literature of benchmarking strategies that enable the trusted and secure cooperative spectrum sensing among Cognitive Radios
Article PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2014 Authors and Global Journals Private Limited