Trust-based Security for Community-based Cognitive Radio Networks

被引:8
|
作者
Parvin, Sazia [1 ]
Hussain, Farookh Khadeer [1 ]
机构
[1] Curtin Univ Technol, Digital Ecosyst & Business Intelligence Inst, Perth, WA, Australia
关键词
Security; Trust; Community; Radio; Networks; User;
D O I
10.1109/AINA.2012.121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cognitive Radio (CR) is considered to be a necessary mechanism to detect whether a particular segment of the radio spectrum is currently in use, and to rapidly occupy the temporarily unused spectrum without interfering with the transmissions of other users. As Cognitive Radio has dynamic properties, so a member of Cognitive Radio Networks may join or leave the network at any time. These properties mean that the issue of secure communication in CRNs becomes more critical than for other conventional wireless networks. This work thus proposes a trust-based security system for community-based CRNs. A CR node's trust value is analyzed according to its previous behavior in the network and, depending on this trust value, it is decided whether this member node can take part in the communication of CRNs. For security purposes, we have designed our model to ensure that the proposed approach is secure in different contexts.
引用
收藏
页码:518 / 525
页数:8
相关论文
共 50 条
  • [31] Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks
    Bhattacharjee, Suchismita
    Marchang, Ningrinla
    [J]. INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 441 - 460
  • [32] Using trust-based philanthropy with community-based organizations during the COVID-19 pandemic
    Powell, Rachel
    Evans, Dorothy
    Bednar, Hailey
    Oladipupo, Brittany
    Sidibe, Turquoise
    [J]. JOURNAL OF PHILANTHROPY AND MARKETING, 2023, 28 (02):
  • [33] A novel trust-based community detection algorithm used in social networks
    Chen, Xianhuan
    Xia, Chengyi
    Wang, Jin
    [J]. CHAOS SOLITONS & FRACTALS, 2018, 108 : 57 - 65
  • [34] A TRUST-BASED SECURITY ARCHITECTURE FOR TACTICAL MANETS
    Lacharite, Yannick
    Nguyen, Dang Quan
    Wang, Maoyu
    Lamont, Louise
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1227 - 1233
  • [35] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    [J]. COMPUTER, 2001, 34 (12) : 154 - 157
  • [36] Trust-based Security for the Spanning Tree Protocol
    Lai, Yingxu
    Liu, Zenghui
    Pan, Qiuyue
    Chen, Yinong
    Zhou, Zhizheng
    [J]. PROCEEDINGS OF 2014 IEEE INTERNATIONAL PARALLEL & DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2014, : 1339 - 1344
  • [37] Trust-based Security for Decentralized Clustering in IoV
    Scott, Chandler
    Khan, Mohammad S.
    Bajracharya, Biju
    Paranjothi, Anirudh
    [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [38] Trust-based security for the OLSR routing protocol
    Adnane, Asma
    Bidan, Christophe
    de Sousa Junior, Rafael Timoteo
    [J]. COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1159 - 1171
  • [39] The Trust-Based MAC - Layer Security Protocol for Mobile Ad hoc Networks
    Rajaram, A.
    Palaniswami, S.
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [40] A Trust-based Security Aware Congestion Control Algorithm for Wireless Sensor Networks
    Pandey, Divya
    Kushwaha, Vandana
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2022, 54 (3-4) : 249 - 290