Cognitive radios have been identified as a solution to the crowded spectrum issue. With the
realization of cognitive radio networks came the recognition that both new and old security
threats are relevant. The cognitive radio network is still vulnerable to many of the
denial of service, wormhole, routing, and jamming attacks that plague other wireless technologies.
In addition, the cognitive radio network is vulnerable to new attacks based on
1. Introduction
It has been estimated that the people of the United
States are now outnumbered by their wireless devices.
The proliferation of wireless devices such as laptops, notebooks,
cellular phones, smart phones, and tablets has
caused the frequency spectrum used for transfer of information
to become crowded [70]. Also, the expected growth
in media-rich consumer applications and wireless data
transfer will continue to further crowd the network, making
additional spectrum throughput a priority.
Currently in the United States spectrum is allotted to
various services in three main categories: licensed, lightly
licensed, and unlicensed [1]. Licensed spectrum refers to