[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sadkhan et al., 2019 - Google Patents

Security issues of cognitive radio network

Sadkhan et al., 2019

Document ID
10710184429882764884
Author
Sadkhan S
Reda D
Publication year
Publication venue
2019 2nd International Conference on Engineering Technology and its Applications (IICETA)

External Links

Snippet

Security is a critical issue in Cognitive Radio Networks CRN. And in order to implement appropriate security mechanisms, various possible attacks on (CRN) must be identified. This paper clarifies a literature review of different CRN surveys, security features of CRN, attacks …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Similar Documents

Publication Publication Date Title
Tanwar et al. A systematic review on security issues in vehicular ad hoc network
Borkar et al. A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept
Nguyen et al. Energy depletion attacks in low power wireless networks
Pelechrinis et al. Denial of service attacks in wireless networks: The case of jammers
Hlavacek et al. A layered approach to cognitive radio network security: A survey
Bhattacharjee et al. Vulnerabilities in cognitive radio networks: A survey
Fragkiadakis et al. A survey on security threats and detection techniques in cognitive radio networks
El-Hajj et al. Survey of security issues in cognitive radio networks
Sadkhan et al. Security issues of cognitive radio network
Hernandez-Serrano et al. Modeling the lion attack in cognitive radio networks
Thamilarasu et al. A cross-layer based intrusion detection approach for wireless ad hoc networks
Fragkiadakis et al. Anomaly‐based intrusion detection of jamming attacks, local versus collaborative detection
Basu et al. Security issues of low power wide area networks in the context of lora networks
Sudha et al. Pulse jamming attack detection using swarm intelligence in wireless sensor networks
Fragkiadakis et al. Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype
Ganeshkumar et al. A novel jammer detection framework for cluster-based wireless sensor networks
Alghamdi Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
Sinha Impact of DoS attack in IoT system and identifying the attacker location for interference attacks
Sen A survey on security and privacy protocols for cognitive wireless sensor networks
Ramachandran et al. [Retracted] A Low‐Latency and High‐Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)
Jayabalan et al. Deep learning model-based detection of jamming attacks in low-power and lossy wireless networks
Kumar et al. Securing mobile ad hoc networks: Challenges and solutions
Balarengadurai et al. Comparative analysis of detection of DDoS attacks in IEEE 802.15. 4 low rate wireless personal area network
Alajmi et al. Comparative analysis of selective forwarding attacks over Wireless Sensor Networks
Gokhale et al. Classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks