Call for
Papers
IEEE Network Magazine
Special Issue on
Security in Cognitive Radio Networks
Cognitive
radio (CR) is an emerging advanced radio technology in wireless
access, with many promising benefits including dynamic spectrum
sharing, robust cross-layer adaptation, and collaborative networking.
Based on a software-defined radio (SDR), cognitive radios are fully
programmable and can sense their environment and dynamically adapt
their transmission frequencies, power levels, modulation schemes, and
networking protocols for improving network and application
performance. It is anticipated that cognitive radio technology will
be the next wave of innovation in information and communications
technologies.
Although the recent years have seen major and
remarkable developments in the field of cognitive networking
technologies, the security aspects of cognitive radio networks have
attracted less attention so far. Due to the particular
characteristics of the CR system, entirely new classes of security
threats and challenges are introduced such as licensed user
emulation, selfish misbehaviors and unauthorized use of spectrum
bands. These new types of attacks take the advantage the inherent
characteristics of CR, and could severely disrupt the basic
functionalities of CR systems. Therefore, for achieving successful
deployment of CR technologies in practice, there is a critical need
for new security designs and implementations to make CR networks
secure and robust against these new attacks. Topics of interest
include, but are not limited to:
- General
security architecture for CR networks
- Cross-layer
security design of CR networks
- Secure routing in
multi-hop CR networks
- Physical layer security for CR
networks
- Geo-location for security in CR networks
- Defending and mitigating jamming-based DoS attacks in CR
networks
- Defending against energy depletion attacks in
resource-constrained CR networks
- Attack modeling,
prevention, mitigation, and defense in CR systems, including primary
user emulation attacks, authentication methods of primary users,
spectrum sensing data falsification, spectrum misusage and selfish
misbehaviors and unauthorized use of spectrum bands
- Methods for detecting, isolating and expelling
misbehaving cognitive nodes
- Security policies,
standards and regulations for CR networks
- Implementation
and testbed for security evaluation in CR systems
- Privacy
protection in CR networks
- Security issues for
database-based CR networks
- Security in CR networks
for the smart grid
- Intrusion detection systems in CR
networks
With regard to both the content and formatting
style of the submissions, prospective contributors should follow the
IEEE Network guidelines for authors that can be found at http://www.comsoc.org/netmag/paper-submission-guidelines.
Authors should submit their manuscripts through ScholarOne for IEEE
Network Magazine. Choose "Special Issue -Security in Cognitive Radio
Networks " from the drop down menu on the submission page. The
timetable is as follows:
Manuscript submission: October 1,
2012
Acceptance notification: January 15, 2012
Final
manuscript due: February 15, 2013
Publication date: May
2013
The Guest Editors for this issue are:
Kui Ren, kren@ece.iit.edu
Haojin Zhu, zhu-hj@cs.sjtu.edu.cn
Zhu Han, zhan2@mail.uh.edu
Radha Poovendran, rp3@uw.edu