Cognitive Radio (CR) is used to represent integration of substantial, computational intelligence particularly in machine learning, vision and natural language processing into software defined radio. Ideal Cognitive Radio is CR with autonomous machine learning, vision and spoken or written language perception .Spectrum shortage is a major problem in wireless communication. Our paper focuses on the existing attacks and security issues in CR Networks on network layer. The fundamentals of CRNs including the basic components, study on the various network layer attacks like Hello flood, Sink Hole, Ripple, Wormhole and their Defense are reviewed . In CR we need to first identify the requirements of protocol for network layer of Cognitive Radio Network, propose a protocol for Defense of attacks, design, implement and evaluate the best effort Network protocols . The scope of this survey is to present an overview of the security threats and challenges on Network Layer in Cognitive Radio. We also presented attack scenarios specific to Cognitive Radio Network architecture and capabilities. Following each attack scenario, we presented mitigation techniques particular to the attack.
Cognitive Radio,Network Layer, Security,Attacks,Countermeasures.
 Joseph Mitola III, Cognitive Radio Architecture, Wiley-Interscience, 2006
 Feng Wang, “Cognitive Radio Networks and Security: A Survey” , Journal of Network and Computer Application vol 35, pp. 1691-1708, 2012
 Deanna Hlavacek and J. Morris Chang, “A layered Approach to cognitive radio network security:A survey”,Computer Networks vol 75 pp. 414-436, 2014
 K.–C.Chen,Y.–J.Peng, N.Prasad, Cognitive Radio Network Architecture: Part I – General Structure
 Y.C. Hu, Adrian Perrig, David B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in:INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies, vol. 3, 2003, pp. 1976-1986 (IEEE).
 Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, A survey of attacks and countermeasures in mobile ad hoc networks, in: Wireless Network Security, Springer, 2007, pp. 103–135.
 Chris Karlof, David Wagner,(2003) Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, IEEE.
 Dr. Moh. Osama K., (2007),Hello flood counter measure for wireless sensor network, International Journal of Computer Science and Security, volume (2) issue (3)
 Cheng-Lung Yang, Wernhuar Tarng, Kuen-Rong Hsieh and Mingteh Chen,”A Security Mechanism for Clustered Wireless Sensor Networks Based on Elliptic Curve Cryptography”, Intelligient Internet Systems, issue 33, 2010
Cite this paper
Manoj R., Harish S. V., Shyam S. Karanth. (2017) Security Attacks and Counter Measures on Network Layer in Cognitive Radio Network: A Review . International Journal of Computers, 2, 175-178
Copyright © 2017 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0