Abstract: As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services and their application leads to the spectrum scarcity. To efficiently access the unavailable spectrum cognitive radio is used. The demanding technology is introduced new spectrum allocation policies, which will allow unlicensed users (i.e., secondary users) to access the radio spectrum when it is not occupied by licensed users (i.e., primary users) will be exploited by the cognitive radio (CR) technology. Security is one of the critical attributes of any communication network. There are various papers covering the security issues over the threats in cognitive radio, but this paper provides an analysis of attacks and comŽmon threats and the possibility of securing the available spectrum from the attackers.
Keywords: Cognitive Radio, Primary User, Secondary user.