Professional Documents
Culture Documents
Abstract—The primary motivator after the evolution of Unfortunately, traditional radio networks also have to deal
cognitive radio is the lack of utilization of the spectrum. This with a variety of security issues, such as attacks that take
technology adds new functionality in the physical layer, data advantage of their adaptability. Currently, network security
link sub-layer, Transmission Control Protocol/Internet research is one of the most popular areas of study for
Protocol layer, and Transport layers of the hierarchy of cognitive networks. Then, it is mandatory to study the
software layers. The majority of the currently available current state of cognitive radio network security research.
research in cognitive radio has concentrated on security The appropriate building and upkeep of security measures to
challenges at the physical, MAC layers. Over the past two thwart assaults made against CRNs are necessary for the
decades, cyber security threats and problems have grown
deployment of CRNs to be successful. We classify the CRNs
significantly, especially in cognitive radio networks. This study
describes and analyzes various attacks that target each layer
attacks into different types: Physical Layer, Data Link
at its protocol stack. Each attack's specific detection sublayer – Medium Access Control, Transmission Control
techniques and defenses are also examined and contrasted. Protocol/Internet Protocol layer, and Transport Layer
attacks.
Keywords—Cognitive Networks, Denial of Service, Licensed We examine the Physical Layer attacks through primary
user, Unlicensed user. user emulation, Eavesdropping, and Jamming attacks.
I. INTRODUCTION Frequency Spectrum Data Falsification through sensing and
Control Channel Capacity Denial of Service threats are
Increasing business demand is driving the update of specified in the MAC layer. The attacks that apply to routing
wireless communication technology, which is evolving in CRNs are the Sinkhole, Hello Flood, and Wormhole
rapidly. Therefore, limited spectrum resources compete with attacks, which are primarily discussed at the network layer.
growing business needs. A Federal Communications We focus on the Lion Attack in the transport layer. This
Commission (FCC) research claims that the current research work is a detailed study of the network security
spectrum underutilization is the outcome of ineffective attacks occurring for Cognitive radios and their
regulations rather than actual spectrum shortages. With a countermeasures. Its setup is given in the form of sections.
restricted supply of spectrum and a rising demand for In Section 2, the Overview of CRNs is described. For the
spectrum for wireless applications and services, cognitive configurability of cognitive radios, Section 3 addresses
radio networks (CRNs) start to make use of this untapped network security and its attacks. The comparison of the
spectrum. It is an intelligent network that uses the radio attacks made as a result of its activity is in Section 4. The
spectrum more effectively and adjusts to environmental areas of future CRN security research and conclusion are
changes. CRNs help address spectrum shortages caused by covered in Section 5.
unauthorized users allowing uninterrupted access to the host
system. II. OVERVIEW OF COGNITIVE RADIO NETWORKS
But Spectrum-sensing technology enables Secondary Since CR depends on the spectrum being open, the
Users (SUs) to use the channels that aren't already being Cognitive radio network should be categorized between
occupied by the authorized Primary Users when CRNs licensed users and cognitive users. Because the frequency
operate in an environment of open and random access band is accessible, cognitive users can locate an unutilized
networks (PUs). spectrum by noticing a gap in the spectrum that the primary
users aren't currently using and exploit it fully to access the
To be effective, CRNs must be secure, just like any other frequency spectrum without disrupting the foundation of
contemporary communication technology. To put it another user network information [1], as demonstrated in Fig. 1.
way, CRNs are required to ensure the privacy, accuracy, and
legitimacy of any data passing over the network.
2413
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:09:54 UTC from IEEE Xplore. Restrictions apply.
2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS)
2414
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:09:54 UTC from IEEE Xplore. Restrictions apply.
2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS)
method involves impersonating the base user's destination b) Control Channel Capacity Denial of Service
and precisely replicating the signal's energy. Attack : When there are more CR nodes easily available for
Various types of PUE Attacks [5] are: a given spectrum, the channel may find it difficult to take
all of the cognitive nodes into account within an appropriate
• Selfish and Malicious PUE Attacks time frame. This could also cause data loss during the
transfer process. With this approach, an attacker might
• PUE Attacks with Fixed and Adaptive Power quickly neutralize the channels by delivering a lot of
• Stationary and Mobile PUE Attacks packets.
3) TCP/IP Attacks: Communication between distant
b) Jamming: The primary goals of the jamming nodes is made possible by the network layer of CRN. The
attack are to prevent information from being exchanged and nodes involved in the source-to-destination data packet
to put the SUs in a denial-of-service position. This method forwarding must vacate the occupied channel immediately
distributes false packets on purpose to make a frequency when the licensed user’s activity is revealed on it [11]. The
band useless for PU and SU [6]. Even though CRNs are still path identification, packet forwarding, or route preservation
vulnerable to DoS assaults similar to those that affect processes are all possible attack targets for the routing
traditional networks, behaviors of the cognitive radio have function. A malicious node disregards the requirements of
been developed to considerably increase network the routing protocols when determining the best path. We
performance when jammers are present. will consider the routing attacks such as Wormhole,
c) Eavesdropping attacks: Because access to the Sinkhole, and Hello Flood.
media is the only requirement for eavesdropping attacks, a) Wormhole Attack: Two attackers intentionally
wireless communications are vulnerable to them. The rogue place themselves within the network in a major threat called
node listening in on transmissions between the CRN's a wormhole attack. The attackers then carry on recording
genuine members is what causes these assaults. The other wireless data and listening to the network. When a
destructive node intercepts a route request (RREQ) in the
objectives of CRN eavesdroppers include gathering
network at one location and delivers it to another hostile
configuration and waveform extraction [7].
attacker at a different location, that attack is known as a
• Configuration Extraction: Malicious devices use wormhole.
this kind of attack to learn the configuration of a b) HELLO Flood attack: This type of attack is carried
CRN node, including the control channel out after an invader forwards a scatter communication
parameters, algorithms of spectrum evaluation, and message to every node in a network with sufficient force as
State information estimation through the channel a neighbor node. Hello, packets are sent throughout the
and transmit-power control strategies. network by one naughty node using powerful enough
• Waveform Data Extraction: A communications transmission channels. With a super-quality path to the BS,
service such as GSM or IEEE 802.11 is the offender alerts the neighboring nodes to its arrival and
implemented in software as waveforms, the tempts them to connect with it. A key that is symmetric
intended data. needs to be shared with a reliable base station to thwart
Hello flood assaults [12]. As in Kerberos, the base station
• Operator Data Extraction: Observers monitor all will take on the role of another party in the network and
network traffic to acquire data that will be useful make it easier for parties to establish session keys to secure
for identity theft or further attacks. their connection.
2) Communication Protocol Layer Attacks: The c) Sinkhole attack: A sinkhole in the network may
Communication Protocol layer is categorized into two just be necessary for one cunning node to manipulate the
layers, Logical Chain Control, and Medium Access routing algorithm and create one. By broadcasting a high-
Control. The access control layer monitors the resource power transmission (using a powerful transmitter) or
management that effectively manages simultaneous appearing to be only one stage away from the base of
accesses while the LLC sublayer carries the traffic density operations, the naughty node gets the network buzzing.
and failing events likelihood [8]. Once trust has been established, a black hole attack is
a) Frequency Spectrum Data Falsification through effective. It intercepts the data packets after playing with
sensing: In a Frequency Spectrum Data Falsification attack, the routing method or occasionally swallows them whole.
a malicious SU sends the data collector fabricated local 4) Transport Layer Segmentation Attacks
spectrum sensing reports (SSRs) on purpose to influence a) Cross-Layer Attack: This attack thwarts the
the user to choose the wrong spectrum. To discover this Transmission Control Protocol connection by utilizing the
type of Attack, several data fusion strategies were put out.
PUE attack. The cross-layer attack known as the Lion attack
The Weighted Sequential Ratio Test (WSRT) data fusion
is made through the lower layer and is directed by the
approach was proposed in [9] as a defense against SSDF
assaults. There are two primary phases of the WSRT. In the transport layer. The performance of TCP is limited because
reputation maintenance process, each node starts with a a CRN is forced to perform frequency spectrum transfer
reputation value of 0. The real hypothesis test stage of when simulating an authorized transmission. Hernandez-
WSPRT is the second phase [10]. It is based on the Serial Serrano et al. propose a strategy to mitigate the lion attack
Probability Ratio Test and has been modified in contrast to that begins by allowing the transmission control protocol to
the regular approach applied to the preceding techniques; know the data exchange between various levels from the
the result value depends on the terminal’s position. physical layer.
2415
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:09:54 UTC from IEEE Xplore. Restrictions apply.
2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS)
Detection Methods Based on trust evaluation occurs at each Does not provide external radio signal
Signal Strength [7] node with continuous monitoring of its interference, a poor access point
Hello Flood neighbor’s misbehaviors location.
Counter Measures A routing discovery process is added to Not useful as does not consider the
Verify the duplex of a link verify the destination nodes easily. availability of spectrum utilization
[19]
2416
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:09:54 UTC from IEEE Xplore. Restrictions apply.
2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS)
2417
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:09:54 UTC from IEEE Xplore. Restrictions apply.