Cognitive Radio Network: Security and Reliability trade-off - Status, Challenges, and Future trend
The security of a cognitive radio network (CRN) is one of the most important features that should receive great attention, especially with the continuing developments in wireless communication systems. Because the security standards for cognitive radio networks (CRN) are the same as those for public...
Saved in:
Published in | 2021 1st Babylon International Conference on Information Technology and Science (BICITS) pp. 149 - 153 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
28.04.2021
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/BICITS51482.2021.9509929 |
Cover
Abstract | The security of a cognitive radio network (CRN) is one of the most important features that should receive great attention, especially with the continuing developments in wireless communication systems. Because the security standards for cognitive radio networks (CRN) are the same as those for public wireless networks. Many attacks affect the security and reliability of the network and the emergence of many challenges, as these attacks are classified on the basis of cognitive radio network layers so that there are different types of attacks for each layer. Security is the most important issue that researchers must address. This paper addresses the review of the literature in this section the different types of approaches the researchers used to provide security for cognitive radio networks are explained. Bearing in mind that security is one of the most important factors that must be focused on and given utmost importance in dealing with cognitive radio networks. Also, this paper deals with a table showing the previous works as it illustrates this table Status, Challenges, and future trends. |
---|---|
AbstractList | The security of a cognitive radio network (CRN) is one of the most important features that should receive great attention, especially with the continuing developments in wireless communication systems. Because the security standards for cognitive radio networks (CRN) are the same as those for public wireless networks. Many attacks affect the security and reliability of the network and the emergence of many challenges, as these attacks are classified on the basis of cognitive radio network layers so that there are different types of attacks for each layer. Security is the most important issue that researchers must address. This paper addresses the review of the literature in this section the different types of approaches the researchers used to provide security for cognitive radio networks are explained. Bearing in mind that security is one of the most important factors that must be focused on and given utmost importance in dealing with cognitive radio networks. Also, this paper deals with a table showing the previous works as it illustrates this table Status, Challenges, and future trends. |
Author | Sadkhan, Sattar B. Jasim, Doaa K. |
Author_xml | – sequence: 1 givenname: Doaa K. surname: Jasim fullname: Jasim, Doaa K. email: doaa.saleh@student.uobabylon.edu.iq organization: Babylon University,College of Information Technology,Babylon,Iraq – sequence: 2 givenname: Sattar B. surname: Sadkhan fullname: Sadkhan, Sattar B. email: drengsattar@ieee.org organization: Babylon University,College of Information Technology,Babylon,Iraq |
BookMark | eNotj8tKw0AYhUfQhdY-gZt5ABPnfnGnwWqgKDR1XSaTP3UwTmQ6Ufr2ttjV-Q58HDhX6DyOERDClJSUEnv3WFf1upFUGFYywmhpJbGW2TM0t9pQpaSgUnN1idpq3MaQww_glevCiF8h_47p8x434KcU8h672OEVDMG1YTj2nFwHxdj3uMBNdnna3eLqww0DxC0c-OgvpjwlOKgQu2t00bthB_NTztD74mldvRTLt-e6elgWgVKTC8o9aMqZFMIzSxzpAbzSknkjwAnScuGd4FpbrrSlvRDMaNYa75hQnks-Qzf_uwEANt8pfLm035ye8z_x3FL5 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/BICITS51482.2021.9509929 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781665415736 1665415738 |
EndPage | 153 |
ExternalDocumentID | 9509929 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i118t-13ce7132544c290a0feec6752c84ea40b34ca4377936791f442872b8ca246c353 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:00 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i118t-13ce7132544c290a0feec6752c84ea40b34ca4377936791f442872b8ca246c353 |
PageCount | 5 |
ParticipantIDs | ieee_primary_9509929 |
PublicationCentury | 2000 |
PublicationDate | 2021-April-28 |
PublicationDateYYYYMMDD | 2021-04-28 |
PublicationDate_xml | – month: 04 year: 2021 text: 2021-April-28 day: 28 |
PublicationDecade | 2020 |
PublicationTitle | 2021 1st Babylon International Conference on Information Technology and Science (BICITS) |
PublicationTitleAbbrev | BICITS |
PublicationYear | 2021 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7819598 |
Snippet | The security of a cognitive radio network (CRN) is one of the most important features that should receive great attention, especially with the continuing... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 149 |
SubjectTerms | challenges and future trend Cognitive radio cognitive radio network(CRN) layered attacks literature review Reliability Security Sensors status Wireless networks Wireless sensor networks |
Title | Cognitive Radio Network: Security and Reliability trade-off - Status, Challenges, and Future trend |
URI | https://ieeexplore.ieee.org/document/9509929 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LSsNAFB3arlyptOKbWbhs0iQzebk0GFqhRWwL3ZV53EAREqnJQr_euXlUFBfuhnAhYWbgzMmcew4hd74vQ0xwsFwhDEFhKrSkBNcydMjPAg1mH2Cj8HwRTNf8aeNvemR86IUBgFp8BjYO67t8XagKf5VNYoNuBs77pB-GcdOr1YlznHjyMEtmq6WPxpaG93mu3Zb_yE2pYSM9JvPuhY1a5NWuSmmrz19ejP_9ohMy-m7Qo88H6DklPciHRCadFIi-CL0r6KKReN_TZRtSR0WuKYqQG3PuD1ruhQaryDJqUTx2Vu9jmnTxKmaM9WntOmJKIdcjsk4fV8nUaiMUrJ1hDhg0r8DQUPQhU17sCCcDUIYjeCriILgjGVeCo-kgC8LYzTgyKE9GSng8UMxnZ2SQFzmcEyq1l6lYSOkL4EpmkdBKhCwEZo6AirMLMsT52b41Lhnbdmou_358RY5wjfBexouuyaDcV3Bj4L2Ut_W6fgEaV6bw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwHA1zHvSksonf5uBx7dom6YdHi2PTbYjbYLeRj19hDFqZ7UH_epN-TBQP3kJISUkKL695v_cQumNMBCbBwXI51wSFyMASAlxL0yGW-Ar0d2AKhSdTf7igT0u2bKHerhYGAErxGdimWd7lq0wW5ldZP9LopuF8D-0zzSqCqlqrkec4Uf9hFI_mM2asLTXz81y7fuBHckoJHIMjNGmmrPQiG7vIhS0_f7kx_vedjlH3u0QPv-zA5wS1IO0gETdiIPzK1TrD00rkfY9ndUwd5qnCRoZc2XN_4HzLFVhZkmALm4Nn8d7DcROwottm_KD0HdFDIVVdtBg8zuOhVYcoWGvNHUzUvARNRI0TmfQihzsJgNQswZMhBU4dQajk1NgOEj-I3IQaDuWJUHKP-pIwcoraaZbCGcJCeYmMuBCMA5UiCbmSPCABEH0IlJSco45Zn9Vb5ZOxqpfm4u_uW3QwnE_Gq_Fo-nyJDs1-mVsaL7xC7XxbwLUG-1zclHv8BQ1YqkE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+1st+Babylon+International+Conference+on+Information+Technology+and+Science+%28BICITS%29&rft.atitle=Cognitive+Radio+Network%3A+Security+and+Reliability+trade-off+-+Status%2C+Challenges%2C+and+Future+trend&rft.au=Jasim%2C+Doaa+K.&rft.au=Sadkhan%2C+Sattar+B.&rft.date=2021-04-28&rft.pub=IEEE&rft.spage=149&rft.epage=153&rft_id=info:doi/10.1109%2FBICITS51482.2021.9509929&rft.externalDocID=9509929 |