Abstract
Networking provides the main infrastructure for different recent applications. These applications are targets for various types of attacks. This research mainly focuses on evaluating the techniques used within cognitive system specifically CRN to ensure the security of the data as well as securing the communication. This will include the development of safety technologies in wireless communication in CRNs and also within wired exchanges in the core network. The study will also incorporate security mechanisms into cognitive network fundamentals as well as designing of monitoring framework (Spec Monitor) to monitor the system and detect malicious and abnormal behaviors. The research will evaluate security development techniques such as spectrum sensing in the cognitive network and non-parametric passive traffic monitoring in cognitive systems. A detailed technique is proposed to overcome the increasing complexity threats in Cognitive networks. The major focus of this technique is on host based approach and network based approach. Henceforth, there has been a comparative study on various attributes of information security.
Similar content being viewed by others
References
Avila LF, Souza AD (2015) Cognitive optical networks cognitive optical networks, elastic networks, dynamic networks. Anais Congr Iniciaç Cient Unicamp. https://doi.org/10.19146/pibic-2015-36979
Battu D (2014) Communication techniques. New Telecom Netw Enterp Secur. https://doi.org/10.1002/9781119004912.ch2
Chakraborty T, Misra IS (2013) VoIP based two-tier cognitive radio network: developing implementation techniques. In: 2013 IEEE international conference on communication, networks and satellite (COMNETSAT). IEEE, Indonesia. https://doi.org/10.1109/comnetsat.2013.6870853
Chehelcheshmeh SB, Hosseinzadeh M (2016) Quantum-resistance authentication in centralized cognitive radio networks. Secur Commun Netw 9(10):1158–1172. https://doi.org/10.1002/sec.1408
Dubey R, Sharma S, Chouhan L (2011) Security for cognitive radio networks. Cogn Radio Interf Manag Technol Strategy. https://doi.org/10.4018/978-1-4666-2005-6.ch013
Fragkiadakis AG, Tragos EZ, Askoxylakis IG (2013) A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun Surv Tutor 15(1):428–445
Garcia-Alfaro J, Herrera-Joancomartí J, Melià-Seguí J (2014) Security and privacy concerns about the RFID layer of EPC Gen2 networks. Stud Comput Intell Adv Res Data Priv. https://doi.org/10.1007/978-3-319-09885-2_17
Hein D, Morozov S, Saiedian H (2011) A survey of client-side Web threats and counter-threat measures. Secur Commun Netw 5(5):535–544. https://doi.org/10.1002/sec.349
Kumar M, Dutta K (2014) A survey of security concerns in various data aggregation techniques in wireless sensor networks. Adv Intell Syst Comput Intell Comput Commun Dev. https://doi.org/10.1007/978-81-322-2009-1_1
Kumar S, Singhal D, Murthy GR (2014) Doubly cognitive architecture based cognitive wireless sensor networks. Secur Des Arch Broadband Wirel Netw Technol. https://doi.org/10.4018/978-1-4666-3902-7.ch009
Mathur CN, Subbalakshmi KP (2012) Security issues in cognitive radio networks. Cogn Netw. https://doi.org/10.1002/9780470515143.ch11
Michael M (2012) Physical security threats and measures. Handbook of computer networks distributed networks, network planning, control, management, and new trends and applications, vol 3, pp 596–631. https://doi.org/10.1002/9781118256107.ch38
Peres M, Chalouf MA, Krief F (2014) PHY/MAC signalling protocols for resilient cognitive radio networks. In: 2014 22nd international conference on software, telecommunications and computer networks (SoftCOM). Croatia. https://doi.org/10.1109/softcom.2014.7039116
Rafe V, Hosseinpouri R (2015) A security framework for developing service-oriented software architectures. Secur Commun Netw 8(17):2957–2972. https://doi.org/10.1002/sec.1222
Sen J (2013) Security and privacy challenges in cognitive wireless sensor networks. Cogn Radio Technol Appl Wirel Mob Ad Hoc Netw. https://doi.org/10.4018/978-1-4666-4221-8.ch011
Sengupta S, Anand S, Chandramouli R (2010) Pricing for security and QoS in cognitive radio networks. Cogn Radio Netw Wirel Netw Mob Commun Arch Protoc Stand. https://doi.org/10.1201/ebk1420077759-c11
Strassner J (2012) The role of autonomic networking in cognitive networks. Cogn Netw. https://doi.org/10.1002/9780470515143.ch2
Tang H, Yu FR, Huang M, Li Z (2012) Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks. IET Commun 6(8):974–983
Wei W (2011) The research of cognitive communication networks. In: 2011 IEEE 3rd international conference on communication software and networks. IEEE, China. https://doi.org/10.1109/iccsn.2011.6013533
Yan Q, Li M, Chen F, Jiang T, Lou W, Hou YT, Lu CT (2013) Non-parametric passive traffic monitoring in cognitive radio networks. In: INFOCOM, 2013 proceedings IEEE. IEEE, Italy, pp 1240–1248
Zhang Y, Zheng J, Chen HH (eds) (2016) Cognitive radio networks: architectures, protocols, and standards. CRC Press, Boca Raton
Acknowledgment
The authors would like to thank Amity Institute of Information Technology, Noida for providing specifications about the application scenario.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Saini, N., Pandey, N. & Singh, A.P. Security enhancement technique in cognitive networks. Int. j. inf. tecnol. 12, 71–75 (2020). https://doi.org/10.1007/s41870-018-0183-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-018-0183-3