Analysis of Attacks in Cognitive Radio Networks
Abstract: As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services and their application leads to the spectrum scarcity. To efficiently access the unavailable spectrum cognitive radio is used. The demanding technology is introduced new spectrum allocation policies, which will allow unlicensed users (i.e., secondary users) to access the radio spectrum when it is not occupied by licensed users (i.e., primary users) will be exploited by the cognitive radio (CR) technology. Security is one of the critical attributes of any communication network. There are various papers covering the security issues over the threats in cognitive radio, but this paper provides an analysis of attacks and com�mon threats and the possibility of securing the available spectrum from the attackers.
Keywords: Cognitive Radio, Primary User, Secondary user.
How to Cite:
[1] M.Padmadas, Dr.N.Krishnan, V.Nellai Nayaki, “Analysis of Attacks in Cognitive Radio Networks,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2015.4835
