Call for Papers 
IEEE Network Magazine
“Special Issue on Security in Cognitive Radio Networks”
 
Cognitive radio (CR) is an emerging advanced radio technology in wireless 
access, with many promising benefits including dynamic spectrum sharing, robust 
cross-layer adaptation, and collaborative networking. Based on a 
software-defined radio (SDR), cognitive radios are fully programmable and can 
sense their environment and dynamically adapt their transmission frequencies, 
power levels, modulation schemes, and networking protocols for improving 
network and application performance. It is anticipated that cognitive radio 
technology will be the next wave of innovation in information and 
communications technologies. 
Although the recent years have seen major and remarkable developments in the 
field of cognitive networking technologies, the security aspects of cognitive 
radio networks have attracted less attention so far. Due to the particular 
characteristics of the CR system, entirely new classes of security threats and 
challenges are introduced such as licensed user emulation, selfish misbehaviors 
and unauthorized use of spectrum bands. These new types of attacks take the 
advantage the inherent characteristics of CR, and could severely disrupt the 
basic functionalities of CR systems. Therefore, for achieving successful 
deployment of CR technologies in practice, there is a critical need for new 
security designs and implementations to make CR networks secure and robust 
against these new attacks. Topics of interest include, but are not limited to:
§  General security architecture for CR networks
§  Cross-layer security design of CR networks
§  Secure routing in multi-hop CR networks
§  Physical layer security for CR networks
§  Geo-location for security in CR networks
§  Defending and mitigating jamming-based DoS attacks in CR networks
§  Defending against energy depletion attacks in resource-constrained CR 
networks
§  Attack modeling, prevention, mitigation, and defense in CR systems, 
including primary user emulation attacks, authentication methods of primary 
users, spectrum sensing data falsification, spectrum misusage and selfish 
misbehaviors and unauthorized use of spectrum bands
§  Methods for detecting, isolating and expelling misbehaving cognitive nodes
§  Security policies, standards and regulations for CR networks
§  Implementation and testbed for security evaluation in CR systems
§  Privacy protection in CR networks
§  Security issues for database-based CR networks
§  Security in CR networks for the smart grid 
§  Intrusion detection systems in CR networks
 
With regard to both the content and formatting style of the submissions, 
prospective contributors should follow the IEEE Network guidelines for authors 
that can be found at http://dl.comsoc.org/livepubs/ni/info/authors.html. 
Authors should submit their manuscripts through ScholarOne for IEEE Network 
Magazine. Choose "Special Issue —Security in Cognitive Radio Networks " from 
the drop down menu on the submission page. The timetable is as follows: 
• Manuscript submission: October 15, 2012
• Acceptance notification: January 15, 2012 
• Final manuscript due: February 15, 2013 
• Publication date: May 2013
 
 The Guest Editors for this issue are:
Kui Ren, [email protected]                                                       
     Haojin Zhu, [email protected] 
Zhu Han, [email protected]                                                      
 Radha Poovendran, [email protected]
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
[email protected]
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

Reply via email to