EconPapers    
Economics at your fingertips  
 

Misbehavior Scenarios in Cognitive Radio Networks

Stamatios Arkoulis, Giannis F. Marias, Pantelis A. Frangoudis, Jens Oberender, Alexandru Popescu, Markus Fiedler, Hermann de Meer and George C. Polyzos
Additional contact information
Stamatios Arkoulis: Mobile Multimedia Laboratory, Athens University of Economics and Business, Athens 11362, Greece
Giannis F. Marias: Mobile Multimedia Laboratory, Athens University of Economics and Business, Athens 11362, Greece
Pantelis A. Frangoudis: Mobile Multimedia Laboratory, Athens University of Economics and Business, Athens 11362, Greece
Jens Oberender: Faculty of Computer Science and Mathematics, University of Passau, Innstraße 43, 94032 Passau, Germany
Alexandru Popescu: Department of Communications and Computer Systems, School of Computing, Blekinge Institute of Technology, 371 79 Karlskrona, Sweden
Markus Fiedler: Department of Communications and Computer Systems, School of Computing, Blekinge Institute of Technology, 371 79 Karlskrona, Sweden
Hermann de Meer: Faculty of Computer Science and Mathematics, University of Passau, Innstraße 43, 94032 Passau, Germany
George C. Polyzos: Mobile Multimedia Laboratory, Athens University of Economics and Business, Athens 11362, Greece

Future Internet, 2010, vol. 2, issue 3, 1-26

Abstract: Recent advances in the fields of Cognitive Radio and the proliferation of open spectrum access promise that spectrum-agile wireless communication will be widespread in the near future, and will bring significant flexibility and potential utility improvements for end users. With spectrum efficiency being a key objective, most relevant research focuses on smart coexistence mechanisms. However, wireless nodes may behave selfishly and should be considered as rational autonomous entities. Selfishness, pure malice or even faulty equipment can lead to behavior that does not conform to sharing protocols and etiquette. Thus, there is a need to secure spectrum sharing mechanisms against attacks in the various phases of the sharing process. Identifying these attacks and possible countermeasures is the focus of this work.

Keywords: spectrum sharing; dynamic spectrum access; security; wireless network access (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2010
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/2/3/212/pdf (application/pdf)
https://www.mdpi.com/1999-5903/2/3/212/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:2:y:2010:i:3:p:212-237:d:9117

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:2:y:2010:i:3:p:212-237:d:9117