SlideShare a Scribd company logo
1 of 25
Presented by:
Nagashree N
Dept. of TCE.
 Introduction.
 Emerging Issues-Spectrum Management.
 Characteristics of Cognitive Radio.
• Cognitive Capability.
• Reconfigurability.
 Attacks and Detection Techniques.
• Incumbent Emulation attack.
• Spectrum Sensing Data Falsification attack.
 Advantages of CRN.
 Applications of CRN.
 Conclusion.
 References.
 A number of wireless applications have been growing over the
last decade. Most of the frequency spectrum has already been
licensed by government agencies, such as Federal
Communications Commission (FCC).
 Therefore, there exists an apparent spectrum scarcity for new
wireless applications and services. Cognitive radio can
efficiently utilize the unused spectrum for secondary usage
without interfering a primary licensed user.
 A Cognitive radio is a fully reconfigurable device which can
observe and change or adapt its communication parameters for
enabling secondary usage of the spectrum and yield an
efficient usage of the spectrum.
 The key motivation behind this technology is to increase
spectral utilization and to optimize the use of radio resources.
 The concept of cognitive radio was first proposed by Joseph
Mitola III in a seminar at KTH(the Royal Institute of
Technology) in 1998.
 Depending on transmission and reception parameters, there are
two main types of cognitive radio:
• Full Cognitive Radio(Mitola Radio).
• Spectrum-Sensing Cognitive Radio.
Cognitive Radio Scenario.
 Determine which portions of the spectrum are available:
Spectrum Sensing.
 Select the best available channel: Spectrum Decision.
 Coordinate access to this channel with other users: Spectrum
Sharing.
 Vacate the channel when a licensed user is detected:
Spectrum Mobility.
 Cognitive Radio have two main characteristics:
• Cognitive Capability.
• Reconfigurability.
 Cognitive Capability: Identify the unused spectrum at a
specific time or location (Spectrum Holes/ White Spaces)
 Reconfigurability: Transmit and Receive on a variety of
frequencies. Use different access technologies.
Spectrum hole.
CRN Architecture.
 We define an attack on cognitive networks as any
activity that results in
(a) unacceptable interference to the licensed primary users
or
(b) missed opportunities for secondary users
Here we describe the attacks against CRs and CRNs
 Incumbent Emulation attacks.
 Spectrum Sensing Data Falsification attacks.
 Cross-layer attacks.
 We have identified and discussed two security threats
to CR networks: IE attacks and SSDF attacks. Both
attacks potentially pose a great threat to CR
networks. There are other types of attacks that can
disrupt operations in a CR network.
 For instance, simple jamming attacks may be very
effective in interfering with the spectrum sensing
process. However, we have limited our discussions to
security issues that are unique to CR networks, with
particular focus on security threats to DSS.
 When an incumbent is detected in a given band, all
secondaries avoid accessing that band.
 In an incumbent emulation (IE) attack, a malicious
secondary tries to gain priority over other secondaries
by transmitting signals that emulate the
characteristics of an incumbent’s.
 There may be “selfish” IE attack or “malicious” IE
attack.
 Malicious secondary users may take advantage of the
cooperative spectrum sensing and launch SSDF
attacks by sending false local spectrum sensing
results to others, resulting in a wrong spectrum
sensing decision.
 Three attack models are presented as follows:
• Selfish SSDF.
• Interference SSDF.
• Confusing SSDF
 Detection of SSDF attacks assume a model where a
number of SUs sense the environment and report
their findings to a FC.
 Fusion Centre fuses the reports provided by the rest
of nodes, uses several fusion rules to evaluate the
reports.
 Furthermore, reports are provided by SUs can be of
two types :
• Binary.
• Continuous.
 Binary type of reporting:
o In the proposed detection algorithm the Trust Values
of SUs and Consistency Values of each user is
computed.
• If both the values falls below a threshold the SU is
characterized as an outlier.
• A drawback of this work is that only one adversary has been
considered.
o In an another model proposed a Reputation Metric is
used to detect and isolate attackers from legitimate
SUs.
• For the computation of this metric the output of each SU is
compared to the decision made by the FC.
o E. Noon and H. Li study a specific case of an
attacker, the “hit-and-run” attacker.
• Deviates between an honest mode and a lying mode.
• The detection scheme combines a point system approach.
 Continuous type of reporting:
o A detection method using statistics is described.
• Here a grid of sensors, divided into clusters, send
information about their RSS, along with their location to the
FC.
• This approach has two phases.
• This approach does not restore the reputation of SU that
temporarily misbehaves as it increases a blacklist counter
each time if the filter’s output does not lie between the
defined thresholds.
o F. Yu, M. Huang, Z. Li and P. Mason propose a
scheme to defend against SSDF attack in a distributed
fashion for Cognitive ad-hoc radio networks.
• A key difference of this work is that no FC is used.
• SUs exchange information and decide independently upon
the presence of the primary transmissions.
• Each SU computes the max deviation of received from the
mean value.
• The simulation results show that distributed consensus
approach gives the best results.
 Unused spectrum are determined and made use of
them automatically.
 Improves the spectrum utilization by neglecting the
over occupied spectrum channels and filling the
unused spectrum channels
 Automatically improves and accomplishes its
progress and minimize interference.
 Spectrum Awareness concept.
 Spectrum sharing techniques can help us fill the
regulatory “gaps” in a particular interference
environment.
 A great deal of research still needs to be done on
simulating and explore these intelligent network
ideas.
 Cognitive radio technology can solve the problem of
spectrum underutilization.
 Simulation framework for security threats in cognitive radio networks
-E. Romero A. Mouradian J. Blesa J.M. Moya A. Araujo
ETSI Telecomunicación n, Universidad Polite cnica de Madrid, 28040
Madrid, Spain.
 Security Aspects in Software Defined Radio and Cognitive Radio
Networks: A Survey and A Way Ahead
-Gianmarco Baldini, Member, IEEE, Taj Sturman, Member, IEEE, Abdur
Rahim Biswas, Member, IEEE, Ruediger
Leschhorn, Member, IEEE, Gy oz o G odor, Member, IEEE, and Michael
Street.
 A Survey on Security Threats and Detection Techniques in Cognitive
Radio Networks
-Alexandors G. Fragkiadakis,Elias Z.Tragos, Ioannis G. Askoxylakis.
Contd…
 International Journal of Computer Applications (0975 – 8887) Volume 30–
No.1, September 2011 31 : Cognitive Radios: Need, Capabilities,
Standards, Applications and Research Challenges
-Prabhjot Kaur Department of Electronics and Communications ITM
University Gurgaon, India.Moin Uddin Delhi Technological University
Delhi, India.Arun Khosla , Department of Electronics and Communications
National Institute of Technology, Jalandhar, India.
 Attack prevention for collaborative spectrum sensing in cognitive radio
networks.
-Lingjie Duan, Alexander W. Min†, Jianwei Huang, Kang G. Shin
† Network Communications and Economics Lab, Dept. of Information
Engineering, The Chinese University of Hong Kong, Hong Kong
†Real-Time Computing Laboratory, Dept. of EECS, The University of
Michigan, Ann Arbor, MI 48109-2121.
Security threats in cognitive radio

More Related Content

What's hot

Information theory & coding (ECE)
Information theory & coding (ECE)Information theory & coding (ECE)
Information theory & coding (ECE)nitmittal
 
Antenna PARAMETERS
Antenna PARAMETERSAntenna PARAMETERS
Antenna PARAMETERSAJAL A J
 
Types of transmission lines
Types of transmission linesTypes of transmission lines
Types of transmission linesSelf-employed
 
Satellite communications ppt
Satellite communications pptSatellite communications ppt
Satellite communications pptNiranjan kumar
 
Half wave dipole antenna
Half wave dipole antennaHalf wave dipole antenna
Half wave dipole antennaRoshan Kattel
 
Smart antenna systems
Smart antenna systems Smart antenna systems
Smart antenna systems Apoorva Shetty
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptAnupam Yadav
 
2.6 cellular concepts - frequency reusing, channel assignment
2.6   cellular concepts - frequency reusing, channel assignment2.6   cellular concepts - frequency reusing, channel assignment
2.6 cellular concepts - frequency reusing, channel assignmentJAIGANESH SEKAR
 
2. wireless propagation models free space propagation
2. wireless propagation models   free space propagation2. wireless propagation models   free space propagation
2. wireless propagation models free space propagationJAIGANESH SEKAR
 
Impedance matching in awr
Impedance matching in awrImpedance matching in awr
Impedance matching in awrAntul Kashyap
 
8085 interfacing with memory chips
8085 interfacing with memory chips8085 interfacing with memory chips
8085 interfacing with memory chipsSrikrishna Thota
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system DesignRaman Deep
 
Fault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating systemFault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating systemanujos25
 
Antennas slideshare part 2
Antennas slideshare part 2Antennas slideshare part 2
Antennas slideshare part 2Muthumanickam
 
Introduction to rf and microwave circuits
Introduction to rf and microwave circuitsIntroduction to rf and microwave circuits
Introduction to rf and microwave circuitsShankar Gangaju
 

What's hot (20)

Pulse width modulation
Pulse width modulationPulse width modulation
Pulse width modulation
 
Information theory & coding (ECE)
Information theory & coding (ECE)Information theory & coding (ECE)
Information theory & coding (ECE)
 
Antenna PARAMETERS
Antenna PARAMETERSAntenna PARAMETERS
Antenna PARAMETERS
 
Unit I.fundamental of Programmable DSP
Unit I.fundamental of Programmable DSPUnit I.fundamental of Programmable DSP
Unit I.fundamental of Programmable DSP
 
Types of transmission lines
Types of transmission linesTypes of transmission lines
Types of transmission lines
 
Satellite communications ppt
Satellite communications pptSatellite communications ppt
Satellite communications ppt
 
Half wave dipole antenna
Half wave dipole antennaHalf wave dipole antenna
Half wave dipole antenna
 
Smart antenna systems
Smart antenna systems Smart antenna systems
Smart antenna systems
 
Aloha
AlohaAloha
Aloha
 
Cognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 pptCognitive Radio Spectrum Sensing 1586 ppt
Cognitive Radio Spectrum Sensing 1586 ppt
 
2.6 cellular concepts - frequency reusing, channel assignment
2.6   cellular concepts - frequency reusing, channel assignment2.6   cellular concepts - frequency reusing, channel assignment
2.6 cellular concepts - frequency reusing, channel assignment
 
2. wireless propagation models free space propagation
2. wireless propagation models   free space propagation2. wireless propagation models   free space propagation
2. wireless propagation models free space propagation
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Impedance matching in awr
Impedance matching in awrImpedance matching in awr
Impedance matching in awr
 
8085 interfacing with memory chips
8085 interfacing with memory chips8085 interfacing with memory chips
8085 interfacing with memory chips
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system Design
 
Multi-Hopping
Multi-HoppingMulti-Hopping
Multi-Hopping
 
Fault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating systemFault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating system
 
Antennas slideshare part 2
Antennas slideshare part 2Antennas slideshare part 2
Antennas slideshare part 2
 
Introduction to rf and microwave circuits
Introduction to rf and microwave circuitsIntroduction to rf and microwave circuits
Introduction to rf and microwave circuits
 

Similar to Security threats in cognitive radio

Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio IOSR Journals
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioIOSR Journals
 
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
Attacks in Cognitive Radio Networks (CRN)   A Survey.pdfAttacks in Cognitive Radio Networks (CRN)   A Survey.pdf
Attacks in Cognitive Radio Networks (CRN) A Survey.pdfYolanda Ivey
 
Cognitive Radio Technology challenges
Cognitive Radio Technology challengesCognitive Radio Technology challenges
Cognitive Radio Technology challengesDr. Nafel Alotaibi
 
IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET Journal
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docIIRindia
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksTELKOMNIKA JOURNAL
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733SIVA SASTHRI
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDSiva Sasthri
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...eSAT Journals
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...IAEME Publication
 

Similar to Security threats in cognitive radio (20)

Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
Attacks in Cognitive Radio Networks (CRN)   A Survey.pdfAttacks in Cognitive Radio Networks (CRN)   A Survey.pdf
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
 
Cognitive Radio Technology challenges
Cognitive Radio Technology challengesCognitive Radio Technology challenges
Cognitive Radio Technology challenges
 
IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum Allocation
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
 
C0363012014
C0363012014C0363012014
C0363012014
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio Networks
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRID
 
Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
 
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 

Recently uploaded

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Recently uploaded (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Security threats in cognitive radio

  • 2.  Introduction.  Emerging Issues-Spectrum Management.  Characteristics of Cognitive Radio. • Cognitive Capability. • Reconfigurability.  Attacks and Detection Techniques. • Incumbent Emulation attack. • Spectrum Sensing Data Falsification attack.  Advantages of CRN.  Applications of CRN.  Conclusion.  References.
  • 3.  A number of wireless applications have been growing over the last decade. Most of the frequency spectrum has already been licensed by government agencies, such as Federal Communications Commission (FCC).  Therefore, there exists an apparent spectrum scarcity for new wireless applications and services. Cognitive radio can efficiently utilize the unused spectrum for secondary usage without interfering a primary licensed user.
  • 4.  A Cognitive radio is a fully reconfigurable device which can observe and change or adapt its communication parameters for enabling secondary usage of the spectrum and yield an efficient usage of the spectrum.  The key motivation behind this technology is to increase spectral utilization and to optimize the use of radio resources.
  • 5.  The concept of cognitive radio was first proposed by Joseph Mitola III in a seminar at KTH(the Royal Institute of Technology) in 1998.  Depending on transmission and reception parameters, there are two main types of cognitive radio: • Full Cognitive Radio(Mitola Radio). • Spectrum-Sensing Cognitive Radio.
  • 7.  Determine which portions of the spectrum are available: Spectrum Sensing.  Select the best available channel: Spectrum Decision.  Coordinate access to this channel with other users: Spectrum Sharing.  Vacate the channel when a licensed user is detected: Spectrum Mobility.
  • 8.  Cognitive Radio have two main characteristics: • Cognitive Capability. • Reconfigurability.  Cognitive Capability: Identify the unused spectrum at a specific time or location (Spectrum Holes/ White Spaces)  Reconfigurability: Transmit and Receive on a variety of frequencies. Use different access technologies.
  • 11.  We define an attack on cognitive networks as any activity that results in (a) unacceptable interference to the licensed primary users or (b) missed opportunities for secondary users Here we describe the attacks against CRs and CRNs  Incumbent Emulation attacks.  Spectrum Sensing Data Falsification attacks.  Cross-layer attacks.
  • 12.  We have identified and discussed two security threats to CR networks: IE attacks and SSDF attacks. Both attacks potentially pose a great threat to CR networks. There are other types of attacks that can disrupt operations in a CR network.  For instance, simple jamming attacks may be very effective in interfering with the spectrum sensing process. However, we have limited our discussions to security issues that are unique to CR networks, with particular focus on security threats to DSS.
  • 13.  When an incumbent is detected in a given band, all secondaries avoid accessing that band.  In an incumbent emulation (IE) attack, a malicious secondary tries to gain priority over other secondaries by transmitting signals that emulate the characteristics of an incumbent’s.  There may be “selfish” IE attack or “malicious” IE attack.
  • 14.  Malicious secondary users may take advantage of the cooperative spectrum sensing and launch SSDF attacks by sending false local spectrum sensing results to others, resulting in a wrong spectrum sensing decision.  Three attack models are presented as follows: • Selfish SSDF. • Interference SSDF. • Confusing SSDF
  • 15.  Detection of SSDF attacks assume a model where a number of SUs sense the environment and report their findings to a FC.  Fusion Centre fuses the reports provided by the rest of nodes, uses several fusion rules to evaluate the reports.  Furthermore, reports are provided by SUs can be of two types : • Binary. • Continuous.
  • 16.  Binary type of reporting: o In the proposed detection algorithm the Trust Values of SUs and Consistency Values of each user is computed. • If both the values falls below a threshold the SU is characterized as an outlier. • A drawback of this work is that only one adversary has been considered.
  • 17. o In an another model proposed a Reputation Metric is used to detect and isolate attackers from legitimate SUs. • For the computation of this metric the output of each SU is compared to the decision made by the FC. o E. Noon and H. Li study a specific case of an attacker, the “hit-and-run” attacker. • Deviates between an honest mode and a lying mode. • The detection scheme combines a point system approach.
  • 18.  Continuous type of reporting: o A detection method using statistics is described. • Here a grid of sensors, divided into clusters, send information about their RSS, along with their location to the FC. • This approach has two phases. • This approach does not restore the reputation of SU that temporarily misbehaves as it increases a blacklist counter each time if the filter’s output does not lie between the defined thresholds.
  • 19. o F. Yu, M. Huang, Z. Li and P. Mason propose a scheme to defend against SSDF attack in a distributed fashion for Cognitive ad-hoc radio networks. • A key difference of this work is that no FC is used. • SUs exchange information and decide independently upon the presence of the primary transmissions. • Each SU computes the max deviation of received from the mean value. • The simulation results show that distributed consensus approach gives the best results.
  • 20.  Unused spectrum are determined and made use of them automatically.  Improves the spectrum utilization by neglecting the over occupied spectrum channels and filling the unused spectrum channels  Automatically improves and accomplishes its progress and minimize interference.
  • 21.
  • 22.  Spectrum Awareness concept.  Spectrum sharing techniques can help us fill the regulatory “gaps” in a particular interference environment.  A great deal of research still needs to be done on simulating and explore these intelligent network ideas.  Cognitive radio technology can solve the problem of spectrum underutilization.
  • 23.  Simulation framework for security threats in cognitive radio networks -E. Romero A. Mouradian J. Blesa J.M. Moya A. Araujo ETSI Telecomunicación n, Universidad Polite cnica de Madrid, 28040 Madrid, Spain.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead -Gianmarco Baldini, Member, IEEE, Taj Sturman, Member, IEEE, Abdur Rahim Biswas, Member, IEEE, Ruediger Leschhorn, Member, IEEE, Gy oz o G odor, Member, IEEE, and Michael Street.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks -Alexandors G. Fragkiadakis,Elias Z.Tragos, Ioannis G. Askoxylakis. Contd…
  • 24.  International Journal of Computer Applications (0975 – 8887) Volume 30– No.1, September 2011 31 : Cognitive Radios: Need, Capabilities, Standards, Applications and Research Challenges -Prabhjot Kaur Department of Electronics and Communications ITM University Gurgaon, India.Moin Uddin Delhi Technological University Delhi, India.Arun Khosla , Department of Electronics and Communications National Institute of Technology, Jalandhar, India.  Attack prevention for collaborative spectrum sensing in cognitive radio networks. -Lingjie Duan, Alexander W. Min†, Jianwei Huang, Kang G. Shin † Network Communications and Economics Lab, Dept. of Information Engineering, The Chinese University of Hong Kong, Hong Kong †Real-Time Computing Laboratory, Dept. of EECS, The University of Michigan, Ann Arbor, MI 48109-2121.