ABSTRACT

Contents 6.1 Introduction and Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 6.2 Overview of Cognitive Radio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

6.2.1 Adaptation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 6.2.2 Awareness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 6.2.3 Reasoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 6.2.4 Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 6.2.5 Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 6.2.6 Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 6.2.7 Cross-Layer Design and Cognitive Radio . . . . . . . . . . . . . . . . . . . 166 6.2.8 Cognitive Radio Standardization and Development

Efforts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 6.2.9 Cognitive Radio: Not Just Dynamic Spectrum Access . . . . . . 167 6.2.10 Cognitive Techniques Are Not Limited to Radio Layers . . . 168

6.3 Overview of the IEEE 802.22 Security Model. . . . . . . . . . . . . . . . . . . . . . 168 6.4 Security Challenges in a Cognitive Radio Network . . . . . . . . . . . . . . . . 169

6.4.1 High-Level Security Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 6.4.2 Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

6.4.2.1 Outside Threat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171

6.4.2.2 Inside Threat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 6.5 Required Security Features of a Cognitive Radio Network . . . . . . . . . 173 6.6 Related Work and Open Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

6.6.1 Authentication of Local Observations . . . . . . . . . . . . . . . . . . . . . . . 175 6.6.2 Verification of Trustworthiness of Remote Observations . . . 177 6.6.3 Secure Decision Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 6.6.4 Self-Diagnosis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 6.6.5 Byzantine Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 6.6.6 Attack Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

6.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

The concepts of cognitive radio and cognitive radio networking are exciting new fields of research and development that have the potential to change the very way in which we think about, design, develop, and evaluate communications networks. One area that is particularly disrupted by cognitive radio networking is that of wireless security. The cognitive radio paradigm introduces entirely new classes of security threats and challenges, and providing strong security may prove to be the most difficult aspect in establishing the long-term viability of cognitive radios. This chapter examines the issue of security in cognitive radio networks, discussing the key challenges of, and new potential threats and nefarious tactics introduced by, cognitive radio networks. The current security posture of the emerging IEEE 802.22 cognitive radio standard is examined. This chapter concludes by discussing promising research across multiple technical disciplines that can be brought to bear on this issue, and outlines areas of future research.