ABSTRACT
CONTENTS 26.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630 26.2 Security Issues Relevant to the Relaying Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
26.2.1 Necessities of Relay Nodes In the Cognitive Radio Networks . . . . . . . . . . . . . . 632 26.2.2 Attack Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
26.2.2.1 Sybil Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633 26.2.2.2 Pollution Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634 26.2.2.3 Relay Attack toward Primary Users . . . . . . . . . . . . . . . . . . . . . . . . . 634 26.2.2.4 Routing toward Primary User Attack . . . . . . . . . . . . . . . . . . . . . . . . 634 26.2.2.5 Cooperative Networking Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
26.3 Detection And Mitigation of Relay Featured Security Threats . . . . . . . . . . . . . . . . . . . . . . 636 26.3.1 Reputation-Based Secure Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
26.3.1.1 Bayesian Reputation Computation-Based Secure CRN . . . . . . . 636 26.3.1.2 Believe Propagation-Based Trust and Reputation System . . . . . 637 26.3.1.3 Reinforcement Learning-Based Trust and Reputation Model . 638 26.3.1.4 Indirect Reciprocity Game-Based Trust and Reputation Model 640 26.3.1.5 Network Coding-Based Secure Network Design . . . . . . . . . . . . . 640
26.3.2 Game-Based Secure Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 644 26.3.3 Other Solutions to Security Issues by Relay Feature . . . . . . . . . . . . . . . . . . . . . . . 647
26.4 Secure Coexistence Issues In Cognitive Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 650 26.4.1 Definition of Fairness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
26.5 Fairness-Based Coexistence Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652 26.5.1 Fair Spectrum Sensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
26.5.2 Fair Dynamic Resource Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653 26.5.2.1 Non-coordinator-Based Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . 653 26.5.2.2 Coordinator-Based Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656
26.5.3 Fair MAC Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659 26.6 Security Issues Relevant to Ineligible Access of Cognitive Radio Networks . . . . . . . . . 663 26.7 Authentication Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
26.7.1 Trust Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665 26.7.2 Physical-Layer authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
26.7.2.1 Authentication Message-Based Mechanisms . . . . . . . . . . . . . . . . . 666 26.7.2.2 Localization-Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 668 26.7.2.3 Link (Channel) Signature-Based Authentication . . . . . . . . . . . . . 669 26.7.2.4 Re-Authentication Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
26.7.3 Jamming Attack on the Common Control Channel and Solutions . . . . . . . . . . . 673 26.7.4 CCC Avoidance Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
26.7.4.1 For Centralized Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674 26.7.4.2 For Decentralized Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675 26.7.4.3 Frequency Hopping-Based CCC Mechanisms . . . . . . . . . . . . . . . . 676
26.7.5 Mechanisms for Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676 26.7.6 DSA-Based mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
26.8 Simulator for Cognitive Radio Networks and Its Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 679 26.9 Potential Security Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
26.1 Introduction The explosions in the number of mobile users and the use of diverse bandwidth-hungry wireless applications have resulted in an exponential growth in the demand for wireless access to the Internet. As a consequence, not only the volume of mobile data traffic is overwhelming the capacity of existing wireless communication networks, but the required high data rates also drains the limited radio resources. The spectrum sharing paradigm has drawn considerable attention for improving the network performance such as the network capacity and data rate. A variety of networks have been designed with spectrum sharing capability, among which the cognitive radio network (CRN) is a promising technique that has been widely researched.