This document discusses security issues in cognitive radio networks. It introduces cognitive radio and describes its ability to sense available spectrum and adapt to optimize usage. The document outlines techniques for spectrum sensing, including matched filtering, cyclostationary feature detection, and energy detection. It also discusses the problem of primary user emulation attacks, where secondary users pretend to be primary users to prevent other secondary users from accessing idle spectrum. Simulation results are presented showing the effects of these malicious users. An altered system model is then proposed to help counteract primary user emulation attacks.