A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

J Marinho, J Granjal, E Monteiro - EURASIP Journal on Information …, 2015 - Springer
Currently, there are several ongoing efforts for the definition of new regulation policies,
paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this …

Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey

F Salahdine, N Kaabouch - Physical Communication, 2020 - Elsevier
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …

A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks

P Ahuja, P Sethi, N Chauhan - Multimedia Tools and Applications, 2024 - Springer
Cognitive radio is providing the solution to the challenges of spectrum scarcity. The central
idea behind this technology is to use spectrum without interfering with the rights of primary …

A decision‐making approach for detecting the primary user emulation attack in cognitive radio networks

W Fassi Fihri, H El Ghazi… - International Journal …, 2019 - Wiley Online Library
Cognitive radio network (CRN) is a promising technology, which enables secondary users to
use the free spectrum channels without causing detrimental interference with the primary …

A survey on security threats in cognitive radio networks based on cooperative spectrum sensing

FD Zemo, S Bakkali - International Journal of …, 2024 - inderscienceonline.com
Cognitive radio networks (CRNs) are a technological revolution that allows unlicensed users
(SUs) to opportunistically use the freely licensed spectrum bands of a primary user (PU). To …

Security threats in mobile cognitive radio networks

IS Trubin - 2018 IEEE East-West Design & Test Symposium …, 2018 - ieeexplore.ieee.org
Today wireless communication technologies are developing rapidly, which leads to an
increase of the number of wireless applications and, as a result, to an increase of the …

Authentication scheme to combat a primary user emulation attack against cognitive radio users

J Avila, K Thenmozhi - Security and communication networks, 2015 - Wiley Online Library
Cognitive radios are a good fit for overcoming inefficient usage of the available radio
spectrum, allowing secondary users to utilize the spectrum when the primary licensed users …

Investigation of security and spectrum management issues in cognitive radio aided by machine learning

SSM Slehat - 2020 - opus.lib.uts.edu.au
Cognitive Radio (CR) is an intelligent and adaptive radio and network technology that
allows transceivers to sense available frequency spectrum and change its parameters, to …

[PDF][PDF] Классификация угроз информационной безопасности в когнитивных сетях связи

АФ Чернышева, ИС Трубин, АГ Корепанов… - Advanced …, 2017 - advanced-science.ru
Сегодня наблюдается ускорение темпов развития технологий беспроводной связи, что
приводит к увеличению количества беспроводных приложений и, как результат, к …

The Solutions to Organize Data for Traffic Infrastructure Managment Combined

TC Duy, TA Kiet - Azerbaijan Journal of High Performance Computing, 2022 - 82.194.3.83
In the 4.0 revolution, almost every problem is gradually being solved by technology; the
pillars are still Cloud Computing, Big Data, AI, and IoT. Among these problems, the problem …