Call for Papers
IEEE Network Magazine
“Special Issue on Security in Cognitive Radio Networks”
Cognitive radio (CR) is an emerging advanced radio technology in wireless
access, with many promising benefits including dynamic spectrum sharing, robust
cross-layer adaptation, and collaborative networking. Based on a
software-defined radio (SDR), cognitive radios are fully programmable and can
sense their environment and dynamically adapt their transmission frequencies,
power levels, modulation schemes, and networking protocols for improving
network and application performance. It is anticipated that cognitive radio
technology will be the next wave of innovation in information and
communications technologies.
Although the recent years have seen major and remarkable developments in the
field of cognitive networking technologies, the security aspects of cognitive
radio networks have attracted less attention so far. Due to the particular
characteristics of the CR system, entirely new classes of security threats and
challenges are introduced such as licensed user emulation, selfish misbehaviors
and unauthorized use of spectrum bands. These new types of attacks take the
advantage the inherent characteristics of CR, and could severely disrupt the
basic functionalities of CR systems. Therefore, for achieving successful
deployment of CR technologies in practice, there is a critical need for new
security designs and implementations to make CR networks secure and robust
against these new attacks. Topics of interest include, but are not limited to:
§ General security architecture for CR networks
§ Cross-layer security design of CR networks
§ Secure routing in multi-hop CR networks
§ Physical layer security for CR networks
§ Geo-location for security in CR networks
§ Defending and mitigating jamming-based DoS attacks in CR networks
§ Defending against energy depletion attacks in resource-constrained CR
networks
§ Attack modeling, prevention, mitigation, and defense in CR systems,
including primary user emulation attacks, authentication methods of primary
users, spectrum sensing data falsification, spectrum misusage and selfish
misbehaviors and unauthorized use of spectrum bands
§ Methods for detecting, isolating and expelling misbehaving cognitive nodes
§ Security policies, standards and regulations for CR networks
§ Implementation and testbed for security evaluation in CR systems
§ Privacy protection in CR networks
§ Security issues for database-based CR networks
§ Security in CR networks for the smart grid
§ Intrusion detection systems in CR networks
With regard to both the content and formatting style of the submissions,
prospective contributors should follow the IEEE Network guidelines for authors
that can be found at http://dl.comsoc.org/livepubs/ni/info/authors.html.
Authors should submit their manuscripts through ScholarOne for IEEE Network
Magazine. Choose "Special Issue —Security in Cognitive Radio Networks " from
the drop down menu on the submission page. The timetable is as follows:
• Manuscript submission: October 15, 2012
• Acceptance notification: January 15, 2012
• Final manuscript due: February 15, 2013
• Publication date: May 2013
The Guest Editors for this issue are:
Kui Ren, [email protected]
Haojin Zhu, [email protected]
Zhu Han, [email protected]
Radha Poovendran, [email protected]
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
[email protected]
https://lists.cs.columbia.edu/cucslists/listinfo/tccc