Nothing Special   »   [go: up one dir, main page]

Computer Science ›› 2018, Vol. 45 ›› Issue (10): 166-171.doi: 10.11896/j.issn.1002-137X.2018.10.031

• Information Security • Previous Articles     Next Articles

Spectrum-aware Secure Opportunistic Routing Protocol in Cognitive Radio Networks

WANG Lu1,2, BAI Guang-wei1, SHEN Hang1,3, WANG Tian-jing1   

  1. College of Computer Science and Technology,Nanjing Tech University,Nanjing 211816,China 1
    State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,China 2
    National Engineering Research Center for Communication and Network Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,China 3
  • Received:2017-09-11 Online:2018-11-05 Published:2018-11-05

Abstract: This paper proposed a spectrum-aware secure opportunistic routing (S2OR) protocol against the dynamic characteristics of spectrum and the potential selective forwarding attack in cognitive radio networks.During the spectrum sensing phase,the availability probability of link among cognitive nodes is analyzed by modeling primary user activity.During the routing selection phase,a trust management model is exploited to examine node’s reliability for packet forwarding,so as to select relay nodes with high trustability and ensure the integrity of data transmission.With the local information,a comprehensive routing metric called the expected throughput,consisting of link availability probability,link quality and node’s trustability,is computed.On this basis,cognitive nodes can opportunistically select candidate forwarding nodes and the corresponding data channels.Simulation results demonstrate that S2OR can well adapt to the dynamics of spectrum,result in higher throughput and reduce the impacts of malicious attacks at the same time.

Key words: Cognitive radio, Opportunistic routing, Spectrum sensing, Trust management

CLC Number: 

  • TP393
[1]AKYILDIZ I F,LEE W Y,CHOWDHURY K R.CRAHNs:Cognitive radio ad hoc networks[J].Ad Hoc Networks,2009,7(5):810-836.
[2]YOUSSEF M,IBRAHIM M,ABDELATIF M,et al.Routing metrics of cognitive radio networks:A survey[J].IEEE Communications Surveys & Tutorials,2014,16(1):92-109.
[3]CESANA M,CUOMO F,EKICI E.Routing in cognitive radio networks:Challenges and solutions[J].Ad Hoc Networks,2011,9(3):228-248.
[4]LIU Y,CAI L X,SHEN X S.Spectrum-aware opportunistic routing in multi-hop cognitive radio networks[J].IEEE Journal on Selected Areas in Communications,2012,30(10):1958-1968.
[5]WEI Z,TANG H,YU F R.A trust based framework for both spectrum sensing and data transmission in CR-MANETs[C]∥IEEE International Conference on Communication Workshop.IEEE,2015:562-567.
[6]DING L,SAVAS O,AHN G S,et al.Securing cognitive radio networks with distributed trust management against belief manipulation attacks[C]∥IEEE GLOBECOM Workshops.IEEE,2015:1-6.
[7]WANG L,WANG Q,ZHANG H.Secure routing algorithm based on trust value for Ad Hoc networks[C]∥International Conference on Computer Engineering,Information Science & Application Technology.2016.
[8]LIN S C,CHEN K C.Spectrum Aware Opportunistic Routing in Cognitive Radio Networks[C]∥Global Telecommunications Conference.IEEE,2010:1-6.
[9]PAN X,JIANG L,HE C.Spectrum aware multi-channel opportunistic routing in cognitive radio sensor networks[C]∥International Conference on Computational and Information Sciences.IEEE Computer Society,2013:1558-1561.
[10]KHASAWNEH M,AGARWAL A.A secure routing algorithm based on nodes behavior during spectrum sensing in cognitive radio networks[C]∥IEEE,International Performance Computing and Communications Conference.IEEE Computer Society,2016:1-8.
[11]ZHANG G,CHEN Z,TIAN L,et al.Using trust to establish a secure routing model in cognitive radio network[J].Plos One,2015,10(9):e0139326.
[12]CUI C,MAN H,WANG Y,et al.Optimal cooperative spectrum aware opportunistic routing in cognitive radio Ad Hoc networks[J].Wireless Personal Communications,2016,91(1):101-118.
[13]AKYILDIZ I F,LO B F,BALAKRISHNAN R.Cooperative spectrum sensing in cognitive radio networks:A survey[J].Physical Communication,2011,4(1):40-62.
[14]REN J,ZHANG Y,ZHANG N,et al.Dynamic channel access to improve energy efficiency in cognitive radio sensor networks[J].IEEE Transactions on Wireless Communications,2016,15(5):3143-3156.
[15]DROMARD J,KHATOUN R,KHOUKHI L.A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network[C]∥International Conference on Te-lecommunications.IEEE,2013:1-5.
[16]MARCHANG N,DATTA R.Light-weight trust-based routing protocol for mobile ad hoc networks[J].Iet Information Security,2012,6(2):77-83.
[17]YADAV R,MANE A.LASAR:Spectrum aware routing protocol for cognitive radio wireless networks[C]∥International Conference on Communication,Information & Computing Technology.IEEE,2015:1-6.
[1] FANG Ting, GONG Ao-yu, ZHANG Fan, LIN Yan, JIA Lin-qiong, ZHANG Yi-jin. Dynamic Broadcasting Strategy in Cognitive Radio Networks Under Delivery Deadline [J]. Computer Science, 2021, 48(7): 340-346.
[2] CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497.
[3] DING Shi-ming, WANG Tian-jing, SHEN Hang, BAI Guang-wei. Energy Classifier Based Cooperative Spectrum Sensing Algorithm for Anti-SSDF Attack [J]. Computer Science, 2021, 48(2): 282-288.
[4] TIAN Miao-miao, WANG Zu-lin, XU Mai. DVB-S2 Signal Receiving and Analysis Based on Cognitive Radio [J]. Computer Science, 2020, 47(4): 226-232.
[5] SU Fan-jun,DU Ke-yi. Trust Based Energy Efficient Opportunistic Routing Algorithm in Wireless Sensor Networks [J]. Computer Science, 2020, 47(2): 300-305.
[6] XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149.
[7] WANG Chen-yang, LIN Hui. Three-dimensional Geographic Opportunistic Routing Based on Energy Harvesting Wireless Sensor Networks [J]. Computer Science, 2019, 46(6A): 305-308.
[8] ZHANG Yu-pei, ZHAO Zhi-jin, ZHENG Shi-lian. Cognitive Decision Engine of Hybrid Learning Differential Evolution and Particle Swarm Optimization [J]. Computer Science, 2019, 46(6): 95-101.
[9] JI Yi, JIA Jun-cheng, SHENG Kai. Time Slot Optimization for Channel Hopping in CRN [J]. Computer Science, 2019, 46(11): 58-64.
[10] ZHAO Peng, WU Li-fa, HONG Zheng. Research on Broker Based Multicloud Access Control Model [J]. Computer Science, 2019, 46(11): 123-129.
[11] GAO Peng, LIU Yun-jiang, GAO Wei-ting, LI Man, CHEN Juan. Double Thresholds DMM Cooperative Spectrum Sensing Algorithm Based on Credibility [J]. Computer Science, 2018, 45(9): 166-170.
[12] CAO Kai-tian, HANG Yi-ling. Novel Energy Detection Method and Detection Performance Analysis [J]. Computer Science, 2018, 45(6A): 266-269.
[13] ZHUANG Ling and YIN Yao-hu. Resource Allocation Algorithm for Cognitive Heterogeneous Networks Based on Imperfect Spectrum Sensing [J]. Computer Science, 2018, 45(5): 49-53.
[14] HAN Li and QIAN Huan-yan. Opportunistic Routing Algorithm Combining Intra-session Coding and Inter-session Coding in Wireless Network [J]. Computer Science, 2018, 45(5): 69-74.
[15] XU Wen-hao, SHEN Hang and BAI Guang-wei. Link Burstiness-aware Opportunistic Routing Protocol in Wireless Networks [J]. Computer Science, 2018, 45(5): 83-88.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!