oalogo2  

AUTHOR(S):

Zoran Bojkovic, Bojan Bakmaz, Miodrag Bakmaz

 

TITLE

Security Aspects in Emerging Wireless Networks

pdf PDF

ABSTRACT

Advances in wireless technologies provide both benefits and challenges when it comes to security. Communications over wireless channels are, by nature, insecure and easily susceptible to various kinds of threats. Despite the current efforts from academia and industry, the security paradigms protecting the confidentiality of wireless communications remain open issue. This paper seeks to provide a comprehensive survey of challenging issues and prospective techniques regarding security in emerging wireless networks. Major security aspects are analyzed through physical layer, together with security of cognitive radio and direct communications as promising solutions for an efficient utilization of scarce frequency spectrum.

KEYWORDS

Cognitive radio networks, D2D, HetNet, LTE-A, physical layer, security, wireless networks

REFERENCES

[1] F. Boccardi, et al. "Five Disruptive Technology Directions for 5G," IEEE Communications Magazine, Vol. 52, No. 2, 2014, pp.74-80.

[2] R. Liu, W. Trappe, Securing Wireless Communications at the Physical Layer, Springer, 2010.

[3] N. Yang, et al., "Safeguarding 5G Wireless Communication Networks Using Physical Layer Security," IEEE Communications Magazine, Vol. 53, No. 4, 2015, pp. 20-27.

[4] Y.-S. Shiu, et al., "Physical Layer Security in Wireless Networks: A Tutorial," IEEE Wireless Communications, Vol. 18, No. 2, 2011, pp. 66- 74.

[5] J. Barros, M. R. D. Rodrigues, "Secrecy Capacity of Wireless Channels," Proc. IEEE ISIT 2006, Seattle, WA, 2006, pp. 356-360.

[6] C. Sperandio, P. G. Flikkema, "Wireless Physical-Layer Security via Transmit Precoding over Dispersive Channels: Optimum Linear Eavesdropping," Proc. IEEE MILCOM 2002, Anaheim, CA, 2002, pp. 1113-1117.

[7] X. Li, E. P. Ratazzi, "MIMO Transmissions with Information-Theoretic Secrecy for SecretKey Agreement in Wireless Networks," Proc. IEEE MILCOM 2005, Atlantic City, NJ, 2005, pp. 1353-1359.

[8] A. A. Tomko, C. J. Rieser, L. H. Buell, "Physical-Layer Intrusion Detection in Wireless Networks," Proc. IEEE MILCOM 2006. Washington, DC, 2006, pp. 1040-1046.

[9] S. Goel, R. Negi, "Guaranteeing Secrecy using Artificial Noise," IEEE Transactions on Wireless Communications, Vol. 7, No. 6, 2008, pp. 2180-2189.

[10] K. R. Rao, Z. S. Bojkovic, B. Bakmaz, Wireless Multimedia Communication Systems: Design, Analysis and Implementation, CRC Press, 2014.

[11] R. K. Sharma, D. B. Rawat, "Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey," IEEE Communications Surveys & Tutorials, Vol. 17, No. 2, 2015, pp. 1023-1043.

[12] R. Chen, et al., "Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks," IEEE Communications Magazine, Vol. 46, No. 4, 2008, pp. 50-55.

[13] X. Tan et al., "Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio," Proc. 4th AMC WiSec ’11. Hamburg, Germany, 2011, pp. 79-90.

[14] I. F. Akyildiz, et al., "A Survey on Spectrum Management in Cognitive Radio Networks," IEEE Communications Magazine, Vol. 46, No. 4, 2008, pp. 40-48.

[15] T. C. Clancy, N. Goergen, "Security in Cognitive Radio Networks: Threats and Mitigation," Proc. 3rd CrownCom 2008, Singapore, 2008, pp. 1-8.

[16] C. N. Mathur, K. P. Subbalakshmi, "Security Issues in Cognitive Radio Networks," in Cognitive Networks: Towards Self-Aware Networks, Q. Mahmoud, ed., Wiley, 2007.

[17] A. G. Fragkiadakis, E. Z. Tragos, I. G. Askoxylakis, "A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks," IEEE Communications Surveys & Tutorials, Vol. 15, No. 1, 2013, 428-245.

[18] S. Parvin, et al., "Cognitive Radio Network Security: A Survey," Journal of Network and Computer Applications, Vol. 35, No. 6, 2012, pp. 1691-1708.

[19] G. Jakimoski, K. P. Subbalakshmi, "Towards Secure Spectrum Decision," Proc. IEEE ICC ’09, Dresden, Germany, 2009, pp. 2759-2763.

[20] K. Doppler, et al., "Device-to-Device Communication as an Underlay to LTEAdvanced Networks," IEEE Communications Magazine, Vol. 47, No. 12, 2009, pp. 42-49.

[21] D. Feng et al., "Device-to-Device Communications Underlaying Cellular Networks," IEEE Transactions on Communications, Vol. 61, No. 8, 2013, pp. 3541-3551.

[22] M. Alam, et al., "Secure Device-to-Device Communication in LTE-A," IEEE Communications Magazine, Vol. 52, No. 4, 2014, pp. 66-73.

[23] M. Tehrani, M. Uysal, H. Yanikomeroglu, "Device-to-Device Communication in 5G Cellular Networks: Challenges, Solutions, and Future Directions," IEEE Communications Magazine, Vol. 52, No. 5, 2014, pp. 86-92.

[24] P. Pahlevani, et al., "Novel Concepts for Device-to-Device Communication Using Network Coding," IEEE Communications Magazine, Vol. 52, No. 4, 2014, pp. 32-39.

Cite this paper

Zoran Bojkovic, Bojan Bakmaz, Miodrag Bakmaz. (2016) Security Aspects in Emerging Wireless Networks. International Journal of Communications, 1, 158-165

 

cc.png
Copyright © 2017 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0