Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3427477.3429992acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Trust Aware Scheme based Malicious Nodes Detection under Cooperative Spectrum Sensing for Cognitive Radio Networks

Published: 05 January 2021 Publication History

Abstract

Emerging of Cognitive Radio (CR) technology has provided an optimistic solution for the dearth of the spectrum by improving the spectrum utilization. The opportunistic use of the spectrum is enabled by spectrum sensing which is one of the key functionality of CR systems. To perform the interference-free transmission in cognitive radio networks, an important part for the unlicensed user is to identify a licensed user with the help of spectrum sensing. Recently, the Cooperative Spectrum Sensing has been widely used in the literature where various scattered unlicensed users collaborate to make the final sensing decision. This overcomes the hidden terminal problem and also improve the overall reliability of the decisions made about the presence or absence of a licensed user. Each unlicensed user sends the sensing results to the base station for the final decision. However, there exist some nodes which do not provide the correct sensing results to maximize their own profit which can highly degrade the CR network functionality. In this paper, a trust-aware model is proposed for the detection of misbehaving nodes such that their sensing reports can be filtered out from the final result. The performance evaluation of the proposed scheme is done by checking its robustness and efficiency against various possible attacks.

References

[1]
Ian F Akyildiz, Brandon F Lo, and Ravikumar Balakrishnan. 2011. Cooperative spectrum sensing in cognitive radio networks: A survey. Physical communication 4, 1 (2011), 40–62.
[2]
Avik Banerjee and Santi P Maity. 2019. Joint cooperative spectrum sensing and primary user emulation attack detection in cognitive radio networks using fuzzy conditional entropy maximization. Transactions on Emerging Telecommunications Technologies 30, 5(2019), e3567.
[3]
Tarun Bansal, Bo Chen, and Prasun Sinha. 2014. FastProbe: Malicious user detection in cognitive radio networks through active transmissions. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications. 2517–2525.
[4]
K-C Chen, Y-J Peng, Neeli Prasad, Y-C Liang, and Sumei Sun. 2008. Cognitive radio network architecture: part II–trusted network layer structure. In Proceedings of the 2nd international conference on Ubiquitous information management and communication. ACM, 120–124.
[5]
T Charles Clancy and Nathan Goergen. 2008. Security in cognitive radio networks: Threats and mitigation. In 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008). IEEE, 1–8.
[6]
Sanjay K Dhurandher, Isaac Woungang, Nitin Gupta, Rishabh Jain, Devesh Singhal, Joshika Agarwal, and Mohammad S Obaidat. 2018. Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks. In 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 1–6.
[7]
Nitin Gupta and Sanjay Kumar Dhurandher. 2019. Cross-layer perspective for channel assignment in cognitive radio networks: A survey. International Journal of Communication Systems (2019), e4261.
[8]
Nitin Gupta, Sanjay Kumar Dhurandher, and Bhoopendra Kumar. 2019. Cognitive Radio Networks: A Comprehensive Review. In Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization. IGI Global, 491–518.
[9]
Nitin Gupta, Sanjay Kumar Dhurandher, and Aarushi Sehgal. 2019. A Contract Theory Approach-Based Scheme to Encourage Secondary Users for Cooperative Sensing in Cognitive Radio Networks. IEEE Systems Journal(2019).
[10]
Xiaoge Huang, Ning Han, Guanbo Zheng, Sunghwan Sohn, and Jaemoung Kim. 2007. Weighted-collaborative spectrum sensing in cognitive radio. In 2007 Second International Conference on Communications and Networking in China. IEEE, 110–114.
[11]
Sumit Kar, Srinivas Sethi, and Ramesh Kumar Sahoo. 2017. A multi-factor trust management scheme for secure spectrum sensing in cognitive radio networks. Wireless Personal Communications 97, 2 (2017), 2523–2540.
[12]
Xianquan Luo. 2020. Secure Cooperative Spectrum Sensing Strategy Based on Reputation Mechanism for Cognitive Wireless Sensor Networks. IEEE Access 8(2020), 131361–131369.
[13]
Sekgoari Mapunya and Mthulisi Velempini. 2018. Investigating spectrum sensing security threats in cognitive radio networks. In Ad Hoc Networks. Springer, 60–68.
[14]
Munehiro Matsui, Hiroyuki Shiba, Kazunori Akabane, and Kazuhiro Uehara. 2007. A novel cooperative sensing technique for cognitive radio. In IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. 1–5.
[15]
Evan Noon and Husheng Li. 2010. Defending against hit-and-run attackers in collaborative spectrum sensing of cognitive radio networks: A point system. In 2010 IEEE 71st Vehicular Technology Conference. 1–5.
[16]
Sazia Parvin, Farookh Khadeer Hussain, Omar Khadeer Hussain, Song Han, Biming Tian, and Elizabeth Chang. 2012. Cognitive radio network security: A survey. Journal of Network and Computer Applications 35, 6(2012), 1691–1708.
[17]
Abbas Ali Sharifi. 2019. Attack-Aware Defense Strategy: A Robust Cooperative Spectrum Sensing in Cognitive Radio Sensor Networks. Iranian Journal of Science and Technology, Transactions of Electrical Engineering 43, 1 (2019), 133–140.
[18]
Oluyomi Simpson and Yichuang Sun. 2020. Robust Statistics Evidence Based Secure Cooperative Spectrum Sensing for Cognitive Radio Networks. In 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 1733–1739.
[19]
Izhar Ahmed Sohu, Asif Ahmed Rahimoon, Amjad Ali Junejo, Arsalan Ahmed Sohu, and Sadam Hussain Junejo. 2019. Analogous Study of Security Threats in Cognitive Radio. In 2nd IEEE International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). 1–4.
[20]
Wenkai Wang, Husheng Li, Yan Sun, and Zhu Han. 2009. Attack-proof collaborative spectrum sensing in cognitive radio networks. In 2009 43rd Annual Conference on Information Sciences and Systems. IEEE, 130–134.
[21]
Wenkai Wang, Husheng Li, Yan Sun, and Zhu Han. 2009. CatchIt: Detect malicious nodes in collaborative spectrum sensing. In IEEE Global Telecommunications Conference (IEEE Globecom). 1–6.
[22]
Jun Wu, Cong Wang, Yue Yu, Tiecheng Song, and Jing Hu. 2020. Performance optimisation of cooperative spectrum sensing in mobile cognitive radio networks. IET Communications 14, 6 (2020), 1028–1036.
[23]
Seyed Abdolazim Vaziri Yazdi and Mahdieh Ghazvini. 2019. Countermeasure with Primary User Emulation Attack in Cognitive Radio Networks. Wireless Personal Communications(2019), 1–17.
[24]
Fang Ye, Zitao Zhou, Ping Bai, Wang Yansong, and Tao Jiang. 2020. A SNR-based PSO Cooperative Spectrum Sensing Algorithm against Malicious Nodes. In 2020 International Conference on Computing, Networking and Communications (ICNC). IEEE, 343–346.
[25]
Linyuan Zhang, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. 2015. Byzantine attack and defense in cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials 17, 3 (2015), 1342–1363.

Cited By

View all
  • (2024)Enhancement of Security in Opportunistic NetworksAdvanced Network Technologies and Intelligent Computing10.1007/978-3-031-64076-6_3(27-43)Online publication date: 8-Aug-2024
  • (2023)Sequential Single Voting for Cooperative Spectrum Sensing Against Byzantine AttackProceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks10.1145/3585967.3585968(1-8)Online publication date: 6-Jan-2023
  • (2022)Performance Analysis of Voting Rule in the Presence of SSDF Attack in Interweave Cognitive Radio Networks2022 International Conference on 6G Communications and IoT Technologies (6GIoTT)10.1109/6GIoTT57212.2022.00018(54-60)Online publication date: Oct-2022
  • Show More Cited By

Index Terms

  1. Trust Aware Scheme based Malicious Nodes Detection under Cooperative Spectrum Sensing for Cognitive Radio Networks
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICDCN '21: Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking
        January 2021
        174 pages
        ISBN:9781450381840
        DOI:10.1145/3427477
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 05 January 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Cognitive Radio Networks
        2. Cooperative Spectrum Sensing
        3. Malicious Nodes
        4. Primary User Emulation Attack.

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICDCN '21

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 21 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Enhancement of Security in Opportunistic NetworksAdvanced Network Technologies and Intelligent Computing10.1007/978-3-031-64076-6_3(27-43)Online publication date: 8-Aug-2024
        • (2023)Sequential Single Voting for Cooperative Spectrum Sensing Against Byzantine AttackProceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks10.1145/3585967.3585968(1-8)Online publication date: 6-Jan-2023
        • (2022)Performance Analysis of Voting Rule in the Presence of SSDF Attack in Interweave Cognitive Radio Networks2022 International Conference on 6G Communications and IoT Technologies (6GIoTT)10.1109/6GIoTT57212.2022.00018(54-60)Online publication date: Oct-2022
        • (2021)Hierarchical game-based secure data collection with trust and reputation management in the cognitive radio networkComputers & Electrical Engineering10.1016/j.compeleceng.2021.10746396(107463)Online publication date: Dec-2021
        • (2021)AI‐enabled trust‐based routing protocol for social opportunistic IoT networksTransactions on Emerging Telecommunications Technologies10.1002/ett.433035:4Online publication date: 17-Jul-2021

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media