The main research trends with enhancement security of cognitive radio networks:
- low computational and energy efficient spectrum sensing, spectrum management, clustering, energy consumption, spectrum handoff, channel allocation, channel access, geolocation information sharing, self-topology generation, cross-layer optimization of protocol stacks.
- In addition, many issues remain to be resolved, such as coexistence with other CR systems, legal issues to access incumbent channels, limit of interference with PUs, transmission power control.
This question is interesting to me because I'm working in one of the main security issues in Cognitive Radio Networks (CRNs) which Primary User Emulation Attack. PUEA is defined as mimicking a Primary Users (PUs) signal by a selfish or malicious attacker (belonging to a CRN) to trigger another CRN to evacuate some of its channels. In the literature, PUEA has been classified under coexistence security issues. To enable efficient communications, CRNs need to address two types of coexistence issues: Incumbent-coexistence which avoiding a harmful interference towards PUs; and Self-coexistence which concerns in preventing interference among themselves).
For more information about PUEA and other security issues, please read the following articles:
1. A survey of security issues in Cognitive Radio Networks.
2. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions.
Wish you the best and thank you for endorsing me some skills.
My dear Colleagues: El-Sayed Mahmoud El-Rabaie, Reema Ahmad, Seyed javad Vaez jalali, Ahmed Fakhrudeen and Ameer Sameer... Eid Mubarek for all of you and your families.
I am glad that you gave some of your opinions about the topic " enhancement the security of CRN"... It is important research topics... and I have many concepts in my mind. But before that I need to ask, What are the main " Cryptosystems " used in the CRN currently?
I think this point must be considered when we need to enhance the security... What you say, please ??
My dear Colleagues... also There is another important point related to " Information Warfare" which is faced every information communication system.. Hence we need to take care about : " Intelligent Jamming and anti-jamming techniques used in CRN" !!.. it is very important approach to help us in the Security enhancement problem .
The dynamic spectrum access(DSA) cryptography is a mandatory process in the CRN, the most significant merit of DSA cryptography is that the additional security can be provided without extra cost. Another important merit of DSA cryptography is that it provides communication level security beyond the capability of computational cryptography (i.e., conventional secret or public key cryptography). The communication level security means that packets are kept from being captured by eavesdroppers in the communication process. This is especially useful for ad hoc CRNs.
I agree with Reema Ahmad. Cryptography is the fastest growing trend in all fields of communication and computer science. Focus should be on transparency to the users as well as the robust nature of the algorithm itself.
in fact we prefer within ( Cryptography :Block ciphers Encryption algorithm [Advanced Encryption Standard (AES) ] ) with some other security model as hybrid model because :
AES is extremely secure , fast and flexible , Non-vulnerable to attack ,plus efficient with some layered attack in CRN depend on these features as i show previously, etc..