ABSTRACT

CONTENTS 26.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630 26.2 Security Issues Relevant to the Relaying Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632

26.2.1 Necessities of Relay Nodes In the Cognitive Radio Networks . . . . . . . . . . . . . . 632 26.2.2 Attack Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633

26.2.2.1 Sybil Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633 26.2.2.2 Pollution Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634 26.2.2.3 Relay Attack toward Primary Users . . . . . . . . . . . . . . . . . . . . . . . . . 634 26.2.2.4 Routing toward Primary User Attack . . . . . . . . . . . . . . . . . . . . . . . . 634 26.2.2.5 Cooperative Networking Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635

26.3 Detection And Mitigation of Relay Featured Security Threats . . . . . . . . . . . . . . . . . . . . . . 636 26.3.1 Reputation-Based Secure Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636

26.3.1.1 Bayesian Reputation Computation-Based Secure CRN . . . . . . . 636 26.3.1.2 Believe Propagation-Based Trust and Reputation System . . . . . 637 26.3.1.3 Reinforcement Learning-Based Trust and Reputation Model . 638 26.3.1.4 Indirect Reciprocity Game-Based Trust and Reputation Model 640 26.3.1.5 Network Coding-Based Secure Network Design . . . . . . . . . . . . . 640

26.3.2 Game-Based Secure Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 644 26.3.3 Other Solutions to Security Issues by Relay Feature . . . . . . . . . . . . . . . . . . . . . . . 647

26.4 Secure Coexistence Issues In Cognitive Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 650 26.4.1 Definition of Fairness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651

26.5 Fairness-Based Coexistence Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652 26.5.1 Fair Spectrum Sensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652

26.5.2 Fair Dynamic Resource Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653 26.5.2.1 Non-coordinator-Based Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . 653 26.5.2.2 Coordinator-Based Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656

26.5.3 Fair MAC Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659 26.6 Security Issues Relevant to Ineligible Access of Cognitive Radio Networks . . . . . . . . . 663 26.7 Authentication Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665

26.7.1 Trust Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665 26.7.2 Physical-Layer authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666

26.7.2.1 Authentication Message-Based Mechanisms . . . . . . . . . . . . . . . . . 666 26.7.2.2 Localization-Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 668 26.7.2.3 Link (Channel) Signature-Based Authentication . . . . . . . . . . . . . 669 26.7.2.4 Re-Authentication Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672

26.7.3 Jamming Attack on the Common Control Channel and Solutions . . . . . . . . . . . 673 26.7.4 CCC Avoidance Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674

26.7.4.1 For Centralized Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674 26.7.4.2 For Decentralized Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675 26.7.4.3 Frequency Hopping-Based CCC Mechanisms . . . . . . . . . . . . . . . . 676

26.7.5 Mechanisms for Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676 26.7.6 DSA-Based mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677

26.8 Simulator for Cognitive Radio Networks and Its Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 679 26.9 Potential Security Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681

26.1 Introduction The explosions in the number of mobile users and the use of diverse bandwidth-hungry wireless applications have resulted in an exponential growth in the demand for wireless access to the Internet. As a consequence, not only the volume of mobile data traffic is overwhelming the capacity of existing wireless communication networks, but the required high data rates also drains the limited radio resources. The spectrum sharing paradigm has drawn considerable attention for improving the network performance such as the network capacity and data rate. A variety of networks have been designed with spectrum sharing capability, among which the cognitive radio network (CRN) is a promising technique that has been widely researched.