Abstract
In this manuscript, we have considered the number of security concerns at different aspects of network communication in hybrid (centralized or distributed) cognitive radio network cell environment by distributing it into inter-domain and intra-domain. We have identified and resolved the routing and handoff process threats in both the domains by proposing a secure communication framework. The intra-domain security threats include routing and handoff CU attacks that are firmed by a Trust Analyzer which computes the TV/TF of each transmitting node or CU. Further, the inter-domain security mechanism efficiently recognized the malicious behavior of the handoff CU during real time communication by proposing a ticket based mechanism. For this, an authentication server is liable for generating and distributing the tickets to all the handoff users by verifying their authenticity. The proposed framework is validated against conventional security mechanism over certain networking parameters such as network throughput, packet delivery ratio, packet loss ratio, falsification attack, average authentication, maximum authentication and probabilistic scenarios of authentication mechanism for both the domains.
Similar content being viewed by others
References
Rabbachin, A., Quek, T. Q., Shin, H., & Win, M. Z. (2011). Cognitive network interference. IEEE Journal on Selected Areas in Communications, 29(2), 480–493.
Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radio more personal. IEEE Personal Communication, 6(4), 13–18.
Jabir, A. J., Shamala, S., Zuriati, Z., & Hamid, N. (2018). A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol. IEEE Systems Journal, 12(1), 1065–1081.
Wang, C. W., & Wang, L. C. (2012). Analysis of reactive spectrum handoff in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(10), 2016–2028.
Gao, R., Ji, X., & Bao, Z. (2018). Secure relay selection of cognitive two-way denoise-and-forward relaying networks. Wireless Personal Communications, 103(4), 2957–2976.
Sharifiand, A. A., & Niya, J. M. (2016). Securing collaborative spectrum sensing against malicious attackers in cognitive radio networks. Wireless Personal Communications, 90(1), 75–91.
Rathee, G., Jaglan, N., Saini, H., Gupta, S. D., & Kanaujia, B. K. (2019). “Probabilistic verification scenarios with reduced authentication delay for handoff clients in mesh networks. Wireless Personal Communications, 104(1–19), 2018.
Val, I., Etxabe, A., Torrego, R., Rodriguez, P. M., Cruces, C., Diez, V., et al. (2019). Design, analysis and implementation of a time-bounded spectrum handoff algorithm for real-time industrial wireless sensor and actuator networks. Journal of Network and Computer Applications, 125, 1–16.
He, Y., Yu, F. R., Wei, Z., & Leung, V. (2019). Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Networks, 86, 154–165.
Salwe, S. S., & Naik, K. K. (2018). Wireless network security based on the image address masking (IAM) mechanism. Wireless Personal Communications, 101(1), 23–40.
Liang, J., Ma, M., Sadiq, M., & Yeung, K. H. (2019). A filter model for intrusion detection system in vehicle ad hoc networks: a hidden Markov methodology. Knowledge-Based Systems, 163, 611–623.
Rathee, G., Saini, H., & Singh, G. (2018). Aspects of trusted routing communication in smart networks. Wireless Personal Communications, 98(2), 2367–2387.
Choi, O. K., & Cho, E. (2019). The mechanism of trust affecting collaboration in virtual teams and the moderating roles of the culture of autonomy and task complexity. Computers in Human Behavior, 91, 305–315.
Dhand, G., & Tyagi, S. (2018). “SMEER: secure multi-tier energy efficient routing protocol for hierarchical wireless sensor networks. Wireless Personal Communications, 105, 1–19.
Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2018). A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3599–3609.
Chen, H., Zhou, M., Xie, L., Wang, K., & Li, J. (2016). Joint spectrum sensing and resource allocation scheme in cognitive radio networks with spectrum sensing data falsification attack. IEEE Transactions on Vehicular Technology, 65(11), 9181–9191.
Althunibat, S., Denise, B., & Granelli, F. (2015). Identification and punishment policies for spectrum sensing data falsification attackers using delivery-based assessment. IEEE Transactions on Vehicular Technology, 65(9), 7308–7321.
Gan, Y., Jiang, C., Beaulieu, N., Wang, J., & Ren, Y. (2016). Secure collaborative spectrum sensing: a peer-prediction method. IEEE Transactions on Communications, 64(10), 4283–4294.
Vosoughi, A., Cavallaro, J. R., & Marshall, A. (2016). Trust-Aware Consensus-Inspired Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks. IEEE Transactions on Cognitive Communications and Networking, 2(1), 24–37.
Liu, Q., Yin, J., Leung, V. C., & Cai, Z. (2013). FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs. IEEE Transactions on Wireless Communications, 12(10), 5124–5137.
Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.
Liu, Y., Dong, M., Ota, K., & Liu, A. (2013). Active trust: secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.
Sharifi, M., Sharifi, A. A., & Niya, M. J. M. (2018). Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach. Wireless Networks, 24(1), 61–68.
Sharef, B., Alsaqour, R., Alawi, M., Abdelhaq, M., & Sundararajan, E. (2018). Robust and trust dynamic mobile gateway selection in heterogeneous VANET-UMTS network. Vehicular Communications, 12, 75–87.
Din, S., Ahmad, A., Paul, A., & Rho, S. (2018). MGR: multi-parameter green reliable communication for internet of things in 5G network. Journal of Parallel and Distributed Computing, 118, 34–45.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rathee, G., Jaglan, N. & Kanaujia, B.K. An Attack Resilient Framework in Cognitive Radio Network Environment for Inter-domain and Intra-domain Communication. Wireless Pers Commun 114, 3457–3475 (2020). https://doi.org/10.1007/s11277-020-07541-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07541-6