2013
DOI: 10.1109/mnet.2013.6523809
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system (IDS) for combating attacks against cognitive radio networks

Abstract: While cognitive radio networks (CRNs) present a promising solution to solve the scarcity of the radio spectrum, they are still susceptible to security threats. Until now, only a few researchers considered the use of intrusion detection systems (IDSs) to combat these threats against CRNs. In this article, we describe a CRN based on IEEE wireless regional area network (WRAN) and describe some of the security threats against it. For the secondary users in the CRN to quickly detect whether they are being attacked,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
31
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(32 citation statements)
references
References 7 publications
1
31
0
Order By: Relevance
“…(Baldini, Sturman et al 2012). Fadlullah, Nishiyama et al (2013) have presented an intrusion detection system for CRAHN that identifies various types of anomalies based on a learning model. A survey of various security challenges and solutions for cognitive radio networks have also been provided in (Attar, H. Tang et al 2012).…”
Section: Research Issues In Crahnmentioning
confidence: 99%
See 1 more Smart Citation
“…(Baldini, Sturman et al 2012). Fadlullah, Nishiyama et al (2013) have presented an intrusion detection system for CRAHN that identifies various types of anomalies based on a learning model. A survey of various security challenges and solutions for cognitive radio networks have also been provided in (Attar, H. Tang et al 2012).…”
Section: Research Issues In Crahnmentioning
confidence: 99%
“…Transport protocol Spectrum awareness TP-CRAHN ) TCP-CR (Yang, Cho et al 2012) 9. Security Jamming Masquerading Authorization Integrity (Fadlullah, Nishiyama et al 2013) 10. Application Spectrum agnostic Novel Application models QoS (Yu, Sun et al 2010) 11.…”
Section: Research Issues In Crahnmentioning
confidence: 99%
“…It can be used towards almost all wireless networks, e.g. UAVs [3], ZigBee, 802.15.4, Mica-2 [4], IEEE 802.11 [5], IEEE 802.11p [6], IEEE 802.15.4a [7], Cognitive Radio Networks [8], etc. are prone to such attack.…”
Section: Introductionmentioning
confidence: 99%
“…For securing the networks against jamming attacks, detection techniques schemes [2,5,6,8] and countermeasures [7,[9][10][11][12] were presented in some literatures. In [5], DOS attacks detection in IEEE 802.11 networks was studied, and a robust nonparametric detection mechanism for the CSMA/CA media-access control layer DOS attacks was presented.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation