Conjoint trust assessment for secure communication in cognitive radio networks

被引:7
|
作者
Parvin, Sazia [1 ]
Hussain, Farookh Khadeer [2 ]
Hussain, Omar Khadeer [1 ]
机构
[1] Curtin Univ, Sch Informat Syst, Perth, WA 6845, Australia
[2] Univ Technol, Fac Engn & Informat Technol, Ctr Quantum Computat & Intelligent Syst, Sch Software,Decis Support & E Serv Intelligence, Ultimo, NSW 2007, Australia
关键词
Radio; Trust; Primary user; Secondary user; Security; Cognitive radio networks; Base station;
D O I
10.1016/j.mcm.2013.01.001
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the rapid development of wireless communication, the growth of Cognitive Radio (CR) is increasing day by day. Because CR is flexible and operates on the wireless network, there are more security threats to CR technology than to the traditional radio environment. In addition, there is no comprehensive framework for achieving security in Cognitive Radio Networks (CRNs), and the role of trust for achieving security in CRNs has not been explored previously. Security vulnerability in cognitive radio technology is unavoidable due to the intrinsic nature of the technology, so it is critical to ensure system security in CRNs. The issue of secure communication in CRNs thus becomes more important than it is in conventional wireless networks. In this paper, we propose a conjoint trust assessment approach (combining trust assessment from the Primary User Network and the Secondary User Network) in a CRN to solve the security threats brought about by untrustworthy entities, such as selfish, malicious, and faultless nodes, and to ensure secure spectrum sharing in CRNs. A numerical analysis shows the feasibility of our proposed approach. Crown Copyright (c) 2013 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1340 / 1350
页数:11
相关论文
共 50 条
  • [41] Secure Cognitive Radio System with Cooperative Secondary Networks
    Liu, Wenli
    Guo, Li
    Kang, Tianyu
    Zhang, Jianwei
    Lin, Jiaru
    2015 22ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2015, : 6 - 10
  • [42] Secondary Encrypted Secure Transmission in Cognitive Radio Networks
    Wang, Dawei
    Ren, Pinyi
    Xu, Qian
    Du, Qinghe
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [43] Secure centralized spectrum sensing for cognitive radio networks
    Chi-Yuan Chen
    Yao-Hsin Chou
    Han-Chieh Chao
    Chi-Hsiang Lo
    Wireless Networks, 2012, 18 : 667 - 677
  • [44] An Effective Secure MAC Protocol for Cognitive Radio Networks
    Al-Amri, Bayan
    Sami, Gofran
    Alhakami, Wajdi
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 42 (01): : 133 - 148
  • [45] Dual Antenna Selection in Secure Cognitive Radio Networks
    Chen, Gaojie
    Gong, Yu
    Xiao, Pei
    Chambers, Jonathon A.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (10) : 7993 - 8002
  • [46] A Secure Protocol in MAC Layer of Cognitive Radio Networks
    Wu, Huayi
    Bai, Baohua
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 154 - 157
  • [47] Using Trust to Establish a Secure Routing Model in Cognitive Radio Network
    Zhang, Guanghua
    Chen, Zhenguo
    Tian, Liqin
    Zhang, Dongwen
    PLOS ONE, 2015, 10 (09):
  • [48] Trust-based Throughput in Cognitive Radio Networks
    Parvin, Sazia
    Hussain, Farookh Khadeer
    Hussain, Omar Khadeer
    Al Faruque, Abdullah
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 713 - 720
  • [49] Trust and reputation management in cognitive radio networks: a survey
    Ling, Mee Hong
    Yau, Kok-Lim Alvin
    Poh, Geong Sen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2160 - 2179
  • [50] Secure Cognitive Radio Communication via Intelligent Reflecting Surface
    Dong, Limeng
    Wang, Hui-Ming
    Xiao, Haitao
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (07) : 4678 - 4690