Skip to main content
Log in

Security enhancement technique in cognitive networks

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Networking provides the main infrastructure for different recent applications. These applications are targets for various types of attacks. This research mainly focuses on evaluating the techniques used within cognitive system specifically CRN to ensure the security of the data as well as securing the communication. This will include the development of safety technologies in wireless communication in CRNs and also within wired exchanges in the core network. The study will also incorporate security mechanisms into cognitive network fundamentals as well as designing of monitoring framework (Spec Monitor) to monitor the system and detect malicious and abnormal behaviors. The research will evaluate security development techniques such as spectrum sensing in the cognitive network and non-parametric passive traffic monitoring in cognitive systems. A detailed technique is proposed to overcome the increasing complexity threats in Cognitive networks. The major focus of this technique is on host based approach and network based approach. Henceforth, there has been a comparative study on various attributes of information security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Avila LF, Souza AD (2015) Cognitive optical networks cognitive optical networks, elastic networks, dynamic networks. Anais Congr Iniciaç Cient Unicamp. https://doi.org/10.19146/pibic-2015-36979

    Article  Google Scholar 

  2. Battu D (2014) Communication techniques. New Telecom Netw Enterp Secur. https://doi.org/10.1002/9781119004912.ch2

    Article  Google Scholar 

  3. Chakraborty T, Misra IS (2013) VoIP based two-tier cognitive radio network: developing implementation techniques. In: 2013 IEEE international conference on communication, networks and satellite (COMNETSAT). IEEE, Indonesia. https://doi.org/10.1109/comnetsat.2013.6870853

  4. Chehelcheshmeh SB, Hosseinzadeh M (2016) Quantum-resistance authentication in centralized cognitive radio networks. Secur Commun Netw 9(10):1158–1172. https://doi.org/10.1002/sec.1408

    Article  Google Scholar 

  5. Dubey R, Sharma S, Chouhan L (2011) Security for cognitive radio networks. Cogn Radio Interf Manag Technol Strategy. https://doi.org/10.4018/978-1-4666-2005-6.ch013

    Article  Google Scholar 

  6. Fragkiadakis AG, Tragos EZ, Askoxylakis IG (2013) A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun Surv Tutor 15(1):428–445

    Article  Google Scholar 

  7. Garcia-Alfaro J, Herrera-Joancomartí J, Melià-Seguí J (2014) Security and privacy concerns about the RFID layer of EPC Gen2 networks. Stud Comput Intell Adv Res Data Priv. https://doi.org/10.1007/978-3-319-09885-2_17

    Article  Google Scholar 

  8. Hein D, Morozov S, Saiedian H (2011) A survey of client-side Web threats and counter-threat measures. Secur Commun Netw 5(5):535–544. https://doi.org/10.1002/sec.349

    Article  Google Scholar 

  9. Kumar M, Dutta K (2014) A survey of security concerns in various data aggregation techniques in wireless sensor networks. Adv Intell Syst Comput Intell Comput Commun Dev. https://doi.org/10.1007/978-81-322-2009-1_1

    Article  Google Scholar 

  10. Kumar S, Singhal D, Murthy GR (2014) Doubly cognitive architecture based cognitive wireless sensor networks. Secur Des Arch Broadband Wirel Netw Technol. https://doi.org/10.4018/978-1-4666-3902-7.ch009

    Article  Google Scholar 

  11. Mathur CN, Subbalakshmi KP (2012) Security issues in cognitive radio networks. Cogn Netw. https://doi.org/10.1002/9780470515143.ch11

    Article  Google Scholar 

  12. Michael M (2012) Physical security threats and measures. Handbook of computer networks distributed networks, network planning, control, management, and new trends and applications, vol 3, pp 596–631. https://doi.org/10.1002/9781118256107.ch38

    Chapter  Google Scholar 

  13. Peres M, Chalouf MA, Krief F (2014) PHY/MAC signalling protocols for resilient cognitive radio networks. In: 2014 22nd international conference on software, telecommunications and computer networks (SoftCOM). Croatia. https://doi.org/10.1109/softcom.2014.7039116

  14. Rafe V, Hosseinpouri R (2015) A security framework for developing service-oriented software architectures. Secur Commun Netw 8(17):2957–2972. https://doi.org/10.1002/sec.1222

    Article  Google Scholar 

  15. Sen J (2013) Security and privacy challenges in cognitive wireless sensor networks. Cogn Radio Technol Appl Wirel Mob Ad Hoc Netw. https://doi.org/10.4018/978-1-4666-4221-8.ch011

    Article  Google Scholar 

  16. Sengupta S, Anand S, Chandramouli R (2010) Pricing for security and QoS in cognitive radio networks. Cogn Radio Netw Wirel Netw Mob Commun Arch Protoc Stand. https://doi.org/10.1201/ebk1420077759-c11

    Article  Google Scholar 

  17. Strassner J (2012) The role of autonomic networking in cognitive networks. Cogn Netw. https://doi.org/10.1002/9780470515143.ch2

    Article  Google Scholar 

  18. Tang H, Yu FR, Huang M, Li Z (2012) Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks. IET Commun 6(8):974–983

    Article  MathSciNet  Google Scholar 

  19. Wei W (2011) The research of cognitive communication networks. In: 2011 IEEE 3rd international conference on communication software and networks. IEEE, China. https://doi.org/10.1109/iccsn.2011.6013533

  20. Yan Q, Li M, Chen F, Jiang T, Lou W, Hou YT, Lu CT (2013) Non-parametric passive traffic monitoring in cognitive radio networks. In: INFOCOM, 2013 proceedings IEEE. IEEE, Italy, pp 1240–1248

  21. Zhang Y, Zheng J, Chen HH (eds) (2016) Cognitive radio networks: architectures, protocols, and standards. CRC Press, Boca Raton

    Google Scholar 

Download references

Acknowledgment

The authors would like to thank Amity Institute of Information Technology, Noida for providing specifications about the application scenario.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Natasha Saini.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saini, N., Pandey, N. & Singh, A.P. Security enhancement technique in cognitive networks. Int. j. inf. tecnol. 12, 71–75 (2020). https://doi.org/10.1007/s41870-018-0183-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-018-0183-3

Keywords

Navigation