2011
DOI: 10.1007/978-3-642-23041-7_22
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks

Abstract: Abstract. Cognitive Radio Networks (CRNs) arise as a promising solution to the scarcity of spectrum. By means of cooperation and smart decisions influenced by previous knowledge, CRNs are able to detect and profit from the best spectrum opportunities without interfering primary licensed users. However, besides the well-known attacks to wireless networks, new attacks threat this type of networks. In this paper we analyze these threats and propose a set of intrusion detection modules targeted to detect them. Pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…A pioneering piece of work indicating the need of IDS in a CRN is presented by Olga et al in [2]. This work explains that most of the existing cryptographic primitives (e.g., authentication and encryption techniques) used in other wireless communication systems may be applicable to CRNs as a first line of defense.…”
Section: Wired Ids Issuesmentioning
confidence: 99%
See 3 more Smart Citations
“…A pioneering piece of work indicating the need of IDS in a CRN is presented by Olga et al in [2]. This work explains that most of the existing cryptographic primitives (e.g., authentication and encryption techniques) used in other wireless communication systems may be applicable to CRNs as a first line of defense.…”
Section: Wired Ids Issuesmentioning
confidence: 99%
“…When a malicious user jams a secondary user's connection, the following observations can be made. While the SS measured at that secondary user remains high, his PDR usually drops [2], [8], [9]. This happens because the secondary user never receives some/all of the packets sent to him.…”
Section: B Detection Phasementioning
confidence: 99%
See 2 more Smart Citations
“…RMs are necessary to validate the confidence of the data supplied for the radios. The architecture of an IDS entity for distributed systems is based on its basic elements: a local packet monitoring module that receives the packets from the neighborhood, a statistics module that stores the information derived from the packets and information regarding the neighborhood, a local detection module that detects the existence of the different attacks, an alert database that stores information about possible attacks, a cooperative detection module that collaborates with other detection entities located within the neighborhood, and a local response module that makes decisions according to the output of the detection modules (Leó n et al, 2011). Focusing on the detection modules used in these IDS for CRNs, they must make use of first-hand information, second-hand information, statistical data, and the data acquired by the CRs during its normal operation.…”
Section: Jamming Countermeasuresmentioning
confidence: 99%