Sadkhan et al., 2019 - Google Patents
Security issues of cognitive radio networkSadkhan et al., 2019
- Document ID
- 10710184429882764884
- Author
- Sadkhan S
- Reda D
- Publication year
- Publication venue
- 2019 2nd International Conference on Engineering Technology and its Applications (IICETA)
External Links
Snippet
Security is a critical issue in Cognitive Radio Networks CRN. And in order to implement appropriate security mechanisms, various possible attacks on (CRN) must be identified. This paper clarifies a literature review of different CRN surveys, security features of CRN, attacks …
- 230000001149 cognitive 0 title abstract description 28
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tanwar et al. | A systematic review on security issues in vehicular ad hoc network | |
Borkar et al. | A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept | |
Nguyen et al. | Energy depletion attacks in low power wireless networks | |
Pelechrinis et al. | Denial of service attacks in wireless networks: The case of jammers | |
Hlavacek et al. | A layered approach to cognitive radio network security: A survey | |
Bhattacharjee et al. | Vulnerabilities in cognitive radio networks: A survey | |
Fragkiadakis et al. | A survey on security threats and detection techniques in cognitive radio networks | |
El-Hajj et al. | Survey of security issues in cognitive radio networks | |
Sadkhan et al. | Security issues of cognitive radio network | |
Hernandez-Serrano et al. | Modeling the lion attack in cognitive radio networks | |
Thamilarasu et al. | A cross-layer based intrusion detection approach for wireless ad hoc networks | |
Fragkiadakis et al. | Anomaly‐based intrusion detection of jamming attacks, local versus collaborative detection | |
Basu et al. | Security issues of low power wide area networks in the context of lora networks | |
Sudha et al. | Pulse jamming attack detection using swarm intelligence in wireless sensor networks | |
Fragkiadakis et al. | Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype | |
Ganeshkumar et al. | A novel jammer detection framework for cluster-based wireless sensor networks | |
Alghamdi | Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud | |
Sinha | Impact of DoS attack in IoT system and identifying the attacker location for interference attacks | |
Sen | A survey on security and privacy protocols for cognitive wireless sensor networks | |
Ramachandran et al. | [Retracted] A Low‐Latency and High‐Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD) | |
Jayabalan et al. | Deep learning model-based detection of jamming attacks in low-power and lossy wireless networks | |
Kumar et al. | Securing mobile ad hoc networks: Challenges and solutions | |
Balarengadurai et al. | Comparative analysis of detection of DDoS attacks in IEEE 802.15. 4 low rate wireless personal area network | |
Alajmi et al. | Comparative analysis of selective forwarding attacks over Wireless Sensor Networks | |
Gokhale et al. | Classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks |