메뉴 건너뛰기




Volumn 14, Issue 2, 2012, Pages 355-379

Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead

Author keywords

Cognitive Radio; Denial of Service; Dynamic Spectrum Allocation; Information Assurance; Security; Software Defined Radio

Indexed keywords

DENIAL OF SERVICE; DYNAMIC SPECTRUM ALLOCATIONS; INFORMATION ASSURANCE; SECURITY; SOFTWARE-DEFINED RADIOS;

EID: 84861330060     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2011.032511.00097     Document Type: Review
Times cited : (169)

References (100)
  • 1
    • 84892987071 scopus 로고
    • The software radio"
    • Digital Object Identifier10.1109/NTC
    • J Mitola, "The Software Radio," IEEE National Telesystems Conference,1992-Digital Object Identifier10.1109/NTC.1992.267870.
    • (1992) IEEE National Telesystems Conference , vol.1992 , pp. 267870
    • Mitola, J.1
  • 3
    • 84893586396 scopus 로고    scopus 로고
    • Last accessed12/04/2010
    • Wireless Innovation Forum. http://www.wirelessinnovation.org. Last accessed12/04/2010.
    • Wireless Innovation Forum
  • 4
    • 70350324202 scopus 로고    scopus 로고
    • Understanding the software communications architecture
    • September
    • C.R. Aguayo Gonzalez, C.B. Dietrich, and J.H. Reed, "Understanding the software communications architecture," IEEE Commun. Mag., vol.47, no.9, pp.50-57, September2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.9 , pp. 50-57
    • Aguayo Gonzalez, C.R.1    Dietrich, C.B.2    Reed, J.H.3
  • 6
    • 33745648091 scopus 로고    scopus 로고
    • Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey"
    • 15 September
    • I. F. Akyildiz, Won-Yeol Lee, M. C. Vuran, and S. Mohanty, "NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey", Computer Networks, Volume 50, Issue13,15 September2006, Pages2127-2159.
    • (2006) Computer Networks , vol.50 , Issue.13 , pp. 2127-2159
    • Akyildiz, I.F.1    Lee, W.-Y.2    Vuran, M.C.3    Mohanty, S.4
  • 9
    • 84861331259 scopus 로고    scopus 로고
    • Web-site: Last accessed4 December2010)
    • NSA's IA Definition, Web-site: http://www.nsa.gov/ia/. Last accessed4 December2010).
    • NSA's IA Definition
  • 10
    • 84861335236 scopus 로고    scopus 로고
    • International Telecommunication Union. Security in Telecommunications and Information Technology. An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications
    • International Telecommunication Union. Security in Telecommunications and Information Technology. An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications.
  • 11
    • 84861329056 scopus 로고    scopus 로고
    • Telecommunication networks security requirements
    • ITU-T E.408. Telecommunication networks security requirements.
    • ITU-T E.408
  • 13
    • 64149083237 scopus 로고    scopus 로고
    • Open architecture standard for nasa's software-defined space telecommunications radio systems
    • Oct
    • R.C.Reinhart, S.K. Johnson, T.J. Kacpura, C.S. Hall, C.R. Smith, and J. Liebetreu, "Open Architecture Standard for NASA's Software-Defined Space Telecommunications Radio Systems," Proc. IEEE, vol.95, no.10, pp.1986-1993, Oct.2007.
    • (2007) Proc. IEEE , vol.95 , Issue.10 , pp. 1986-1993
    • Reinhart, R.C.1    Johnson, S.K.2    Kacpura, T.J.3    Hall, C.S.4    Smith, C.R.5    Liebetreu, J.6
  • 14
    • 84945986485 scopus 로고    scopus 로고
    • System threat analysis for high assurance software defined radios", in
    • SDR Forum, Phoenix, AZ November
    • D. Murotake and A. Martin, "System threat analysis for high assurance software defined radios", in Proceedings, SDR'04 Technical Conference, SDR Forum, Phoenix, AZ, November2004.
    • (2004) Proceedings, SDR'04 Technical Conference
    • Murotake, D.1    Martin, A.2
  • 15
    • 70350323626 scopus 로고    scopus 로고
    • Security, privacy, and accountability in wireless access networks
    • Aug
    • L. Wenjing and R. Kui, "Security, privacy, and accountability in wireless access networks," IEEE Wireless Commun., vol.16, no.4, pp.80-87, Aug.2009.
    • (2009) IEEE Wireless Commun. , vol.16 , Issue.4 , pp. 80-87
    • Wenjing, L.1    Kui, R.2
  • 19
    • 84861335233 scopus 로고    scopus 로고
    • Software defined radio: Challenges and opportunities
    • T. Ulversoy, "Software Defined Radio: Challenges and Opportunities," IEEE Commun. Surveys Tutorials, no.99, pp.1-20.
    • IEEE Commun. Surveys Tutorials , Issue.99 , pp. 1-20
    • Ulversoy, T.1
  • 23
    • 24144478503 scopus 로고    scopus 로고
    • An anti-cloning framework for software defined radio mobile devices
    • WN24-2, ICC 2005 - 2005 IEEE International Conference on Communications
    • A. Brawerman and J.A. Copeland, "An anti-cloning framework for software defined radio mobile devices," in Proc. IEEE International Conference on Communications (ICC'05), vol.5, no., pp.3434-3438,16-20 May2005, Seoul, Korea. (Pubitemid 41240891)
    • (2005) IEEE International Conference on Communications , vol.5 , pp. 3434-3438
    • Brawerman, A.1    Copeland, J.A.2
  • 30
    • 51349141382 scopus 로고    scopus 로고
    • Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: A multi-dimensional analysis and assessment
    • 1-3 Aug.2007, Orlando, Florida
    • T. X Brown and A. Sethi, "Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment," in Proc.2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM2007), vol., no., pp.456-464,1-3 Aug.2007, Orlando, Florida
    • (2007) Proc.2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM , pp. 456-464
    • Brown, T.X.1    Sethi, A.2
  • 32
    • 78650759662 scopus 로고    scopus 로고
    • A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming
    • 16-19 Nov.2008, San Diego, CA, USA
    • J.L. Burbank, A.R. Hammons, and S.D. Jones, "A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming," in Military Communications Conference,2008. (MILCOM2008), vol., no., pp.1-7,16-19 Nov.2008, San Diego, CA, USA.
    • Military Communications Conference,2008. (MILCOM2008), vol., no , pp. 17
    • Burbank, J.L.1    Hammons, A.R.2    Jones, S.D.3
  • 34
    • 42649135628 scopus 로고    scopus 로고
    • Toward secure distributed spectrum sensing in cognitive radio networks
    • DOI 10.1109/MCOM.2008.4481340
    • R. Chen; Jung-Min PlacePark; Y.T. Hou, and J.H. Reed, "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Commun. Mag., vol.46, no.4, pp.50-55, April2008. (Pubitemid 351593407)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 50-55
    • Chen, R.1    Park, J.-M.2    Hou, Y.T.3    Reed, J.H.4
  • 35
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan
    • R. Chen, J.M. Park, and J.H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE J. Sel. Areas Commun., vol.26, no.1, pp.25-37, Jan.2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.M.2    Reed, J.H.3
  • 41
    • 70349664565 scopus 로고    scopus 로고
    • Common control channel security framework for cognitive radio networks
    • Spring26-29 April2009, Barcelona, Spain
    • G.A. Safdar and M. O'Neill, "Common Control Channel Security Framework for Cognitive Radio Networks," in69th IEEE Vehicular Technology Conference, (VTC Spring2009), vol., no., pp.1-5,26-29 April2009, Barcelona, Spain.
    • (2009) 69th IEEE Vehicular Technology Conference, (VTC , pp. 15
    • Safdar, G.A.1    O'Neill, M.2
  • 42
    • 77953195920 scopus 로고    scopus 로고
    • Catching attacker(s) for collaborative spectrum sensing in cognitive radio systems: An abnormality detection approach
    • 6-9 April2010, Singapore
    • L. Husheng and H. Zhu, "Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach," in IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN2010), vol., no., pp.1-12,6-9 April2010, Singapore.
    • IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN2010), vol., no , pp. 1-12
    • Husheng, L.1    Zhu, H.2
  • 43
    • 62449144001 scopus 로고    scopus 로고
    • Secure cognitive networks
    • 27-28 Oct.2008, Amsterdam, The Netherlands
    • N.R. Prasad, "Secure Cognitive Networks," in European Conference on Wireless Technology (EuWiT2008), vol., no., pp.107-110,27-28 Oct.2008, Amsterdam, The Netherlands.
    • (2008) European Conference on Wireless Technology (EuWiT , pp. 107-110
    • Prasad, N.R.1
  • 49
    • 1842865621 scopus 로고    scopus 로고
    • Radio software download for commercial wireless reconfigurable devices
    • Mar StateIl-PlaceNamePyung PlaceTypePark
    • J. CityHoffmeyer, StateIl-PlaceNamePyung PlaceTypePark, M. Majmundar, and S. Blust, "Radio software download for commercial wireless reconfigurable devices," IEEE Commun. Mag., vol.42, no.3, pp. S26-S32, Mar2004.
    • (2004) IEEE Commun. Mag. , vol.42 , Issue.3
    • CityHoffmeyer, J.1    Majmundar, M.2    Blust, S.3
  • 51
    • 78649410340 scopus 로고    scopus 로고
    • Trusted computing technologies and their use in the provision of high assurance sdr platforms
    • Nov2006, Orlando, Florida, USA
    • E. Gallery and C. Mitchell, "Trusted computing technologies and their use in the provision of high assurance SDR platforms," in2006 Software Defined Radio Technical Conf. Product Exposition, Nov2006, Orlando, Florida, USA.
    • 2006 Software Defined Radio Technical Conf. Product Exposition
    • Gallery, E.1    Mitchell, C.2
  • 54
    • 84861331255 scopus 로고    scopus 로고
    • Updated system threat analysis for high assurance software defined radios", in
    • SDR Forum, Anaheim, CA November
    • D. Murotake and A. Martin, "Updated system threat analysis for high assurance software defined radios", in Proceedings, SDR'05 Technical Conference, SDR Forum, Anaheim, CA, November2005.
    • (2005) Proceedings, SDR'05 Technical Conference
    • Murotake, D.1    Martin, A.2
  • 55
    • 77949356469 scopus 로고    scopus 로고
    • Reputation-based cooperative spectrum sensing with trusted nodes assistance
    • March
    • Z. Kun, P. Paweczak, and D. Cabric, "Reputation-based cooperative spectrum sensing with trusted nodes assistance," IEEE Communications Letters, vol.14, no.3, pp.226-228, March2010.
    • (2010) IEEE Communications Letters , vol.14 , Issue.3 , pp. 226-228
    • Kun, Z.1    Paweczak, P.2    Cabric, D.3
  • 61
    • 70349653799 scopus 로고    scopus 로고
    • Double thresholds based cooperative spectrum sensing against untrusted secondary users in cognitive radio networks
    • Spring26-29 April2009, Barcelona, Spain
    • X. Shaoyi, S. Yanlei, and W. Haiming, "Double Thresholds Based Cooperative Spectrum Sensing Against Untrusted Secondary Users in Cognitive Radio Networks," in IEEE69th Vehicular Technology Conference, (VTC Spring2009), vol., no., pp.1-5,26-29 April2009, Barcelona, Spain.
    • (2009) IEEE69th Vehicular Technology Conference, (VTC , pp. 15
    • Shaoyi, X.1    Yanlei, S.2    Haiming, W.3
  • 62
  • 63
    • 70349185618 scopus 로고    scopus 로고
    • A survey of spectrum sensing algorithms for cognitive radio applications
    • First Quarter
    • T. Yucek, H. Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications," IEEE Commun. Surveys Tutorials, vol.11, no.1, pp.116-130, First Quarter2009.
    • (2009) IEEE Commun. Surveys Tutorials , vol.11 , Issue.1 , pp. 116-130
    • Yucek, T.1    Arslan, H.2
  • 70
    • 70449368657 scopus 로고    scopus 로고
    • A survey of survivability in mobile ad hoc networks
    • First Quarter
    • M. CityLima, A. dos Santos, G. Pujolle, "A survey of survivability in mobile ad hoc networks," IEEE Commun. Surveys Tutorials, vol.11, no.1, pp.66-77, First Quarter2009.
    • (2009) IEEE Commun. Surveys Tutorials , vol.1 , Issue.11 , pp. 66-77
    • CityLima, M.1    Dos Santos, A.2    Pujolle, G.3
  • 71
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public key management for mobile ad hoc networks
    • S. Capkun, L. Buttyan, and J.-P. Hubaux. Self-organized public key management for mobile ad hoc networks. IEEE Trans. Mobile Comput., Vol.2, No.1, pp. 52-64,2003.
    • (2003) IEEE Trans. Mobile Comput. , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 73
    • 70349664565 scopus 로고    scopus 로고
    • Common control channel security framework for cognitive radio networks," in the
    • Spring26-29 April2009, Barcelona, Spain
    • G.A. Safdar and M. O'Neill, "Common Control Channel Security Framework for Cognitive Radio Networks," in the69th Vehicular Technology Conference (VTC Spring2009), vol., no., pp.1-5,26-29 April2009, Barcelona, Spain.
    • (2009) 69th Vehicular Technology Conference (VTC , pp. 15
    • Safdar, G.A.1    O'Neill, M.2
  • 75
    • 73049083486 scopus 로고    scopus 로고
    • Anti-jamming coding techniques with application to cognitive radio
    • December
    • Y. Guosen and W. Xiaodong, "Anti-jamming coding techniques with application to cognitive radio," IEEE Trans. Wireless Commun., , vol.8, no.12, pp.5996-6007, December2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.12 , pp. 5996-6007
    • Guosen, Y.1    Xiaodong, W.2
  • 76
    • 70349682523 scopus 로고    scopus 로고
    • Secure physical layer using dynamic permutations in cognitive ofdma systems
    • Spring26-29 April2009
    • F. Meucci, S.A. Wardana and N.R. Prasad, "Secure Physical Layer using Dynamic Permutations in Cognitive OFDMA Systems," in IEEE69th Vehicular Technology Conference, (VTC Spring2009), vol., no., pp.1-5,26-29 April2009.
    • (2009) IEEE69th Vehicular Technology Conference, (VTC , pp. 15
    • Meucci, F.1    Wardana, S.A.2    Prasad, N.R.3
  • 78
    • 77951486373 scopus 로고    scopus 로고
    • Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios
    • 18-21 Oct.2009, Boston, MA
    • F.R. Yu, H. Tang, H. Minyi, L. Zhiqiang and P.C. Mason, "Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios," in IEEE Military Communications Conference, (MILCOM2009), vol., no., pp.1-7,18-21 Oct.2009, Boston, MA,2009.
    • IEEE Military Communications Conference, (MILCOM2009), vol., no , vol.2009 , pp. 17
    • Yu, F.R.1    Tang, H.2    Minyi, H.3    Zhiqiang, L.4    Mason, P.C.5
  • 79
    • 33749154671 scopus 로고    scopus 로고
    • Difficulties in providing certification and assurance for software defined radios
    • DOI 10.1109/DYSPAN.2005.1542666, 1542666, 2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005
    • J. Giacomoni and D.C. Sicker, "Difficulties in providing certification and assurance for software defined radios," in First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, (DySPAN2005)., vol., no., pp.526-538,8-11 Nov.2005. (Pubitemid 44467825)
    • (2005) 2005 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005 , pp. 526-538
    • Giacomoni, J.1    Sicker, D.C.2
  • 82
    • 84861336641 scopus 로고    scopus 로고
    • FP7 EULER CORDIS web page. Last accessed27/06/2010
    • FP7 EULER CORDIS web page. http://cordis.europa.eu. Last accessed27/06/2010.
  • 87
    • 84861329043 scopus 로고    scopus 로고
    • Common Criteria National Institute of Standards and Technology Std [Online]. Available
    • Common Criteria, National Institute of Standards and Technology Std. [Online]. Available: http://csrc.nist.gov/cc
  • 88
    • 84861331251 scopus 로고    scopus 로고
    • Wireless Innovation Forum's Security Working Group. Document Id: WINNF-08-P-0013.
    • Wireless Innovation Forum's Security Working Group. Securing Software Reconfigurable Communications Devices. Document Id: WINNF-08-P-0013
    • Securing Software Reconfigurable Communications Devices
  • 92
    • 52549084899 scopus 로고    scopus 로고
    • Security issues in cognitive networks", book chapter in
    • Ed. Qusay H. Mahmoud Wiley, ISBN:9780-470-061961
    • N. Chetan and K.P. Subbalakshmi, "Security Issues in Cognitive Networks", Book Chapter in Cognitive Networks: Towards Self-Aware Networks, Ed. Qusay H. Mahmoud, Wiley, pp:271-292, ISBN:9780-470-06196-1,2007.
    • (2007) Cognitive Networks: Towards Self-Aware Networks , pp. 271-292
    • Chetan, N.1    Subbalakshmi, K.P.2
  • 95
    • 77955623517 scopus 로고    scopus 로고
    • Optimal siso and mimo spectral efficiency to minimize hidden-node network interference
    • July
    • D.W. Bliss, "Optimal SISO and MIMO Spectral Efficiency to Minimize Hidden-Node Network Interference," IEEE Commun. Lett., vol.14, no.7, pp.620-622, July2010.
    • (2010) IEEE Commun. Lett. , vol.14 , Issue.7 , pp. 620-622
    • Bliss, D.W.1
  • 100
    • 58049207983 scopus 로고    scopus 로고
    • Policy-based spectrum access control for dynamic spectrum access network radios", in
    • The Semantic Web and Policy January Pages21-27, ISSN1570-
    • F. Perich, and M. McHenry, "Policy-based spectrum access control for dynamic spectrum access network radios", in Web Semantics: Science, Services and Agents on the World Wide Web, Volume7, Issue1, The Semantic Web and Policy, January2009, Pages21-27, ISSN1570-8268.
    • (2009) Web Semantics: Science, Services and Agents on the World Wide Web , vol.7 , Issue.1 , pp. 8268
    • Perich, F.1    McHenry, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.