A Trust-Based Technique for Secure Spectrum Access in Cognitive Radio Networks

被引:1
|
作者
Kar, Sumit [1 ]
Sethi, Srinivas [1 ]
Sahoo, Ramesh Kumar [1 ]
机构
[1] IGIT, Dept Comp Sci Engn & Applicat, Sarang 759146, Odisha, India
关键词
Cognitive radio networks; Trust; Secure spectrum access; Malicious node detection; ESTABLISHMENT SCHEME; MANAGEMENT; ATTACK;
D O I
10.1007/978-981-10-7871-2_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cognitive radio networks (CRNs) are becoming an important part of wireless communications, which can improve the utilization of the limited and scarce spectrum resources. However, the flexibility and the unique characteristics of CRN make it vulnerable to varied types of attack. Moreover, security is a key requirement at every step of its functionality (spectrum sensing, spectrum analysis, spectrum decision and spectrum act). Numerous researches have mainly focused on to provide security at the cognition capability (spectrum sensing, spectrum analysis and spectrum decision) of CRN for detecting the appropriate spectrum holes. However, after obtaining access to the spectrum hole (Spectrum Act), a Cognitive Radio (CR) may behave maliciously to achieve own benefits or for some other reasons. Such maliciousness can severely affect the normal activities of the whole network. Therefore, there is a need to track and record the behaviour during the spectrum access of a CR user, which can encourage the CR users to obey the opportunistic spectrum access policy. In this paper, we construct a trust-based approach for secure spectrum access in CRN. The CR nodes trust value is determined from its past activities, and based on which, it is decided whether the CR node will get access the primary users free spectrum or not.
引用
收藏
页码:9 / 18
页数:10
相关论文
共 50 条
  • [31] Conjoint trust assessment for secure communication in cognitive radio networks
    Parvin, Sazia
    Hussain, Farookh Khadeer
    Hussain, Omar Khadeer
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1340 - 1350
  • [32] Prediction-Based Spectrum Access Optimization in Cognitive Radio Networks
    Zuo, PeiLiang
    Wang, Xing
    Linghu, Wangdan
    Sun, Rong
    Peng, Tao
    Wang, Wenbo
    [J]. 2018 IEEE 29TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2018,
  • [33] Dynamic spectrum access-based cryptosystem for cognitive radio networks
    Zou, Chao
    Chigan, Chunxiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4151 - 4165
  • [34] Opportunistic spectrum access for TDMA-based cognitive radio networks
    Zhai, Linbo
    [J]. OPTIK, 2014, 125 (09): : 2081 - 2085
  • [35] Entropy-based opportunistic spectrum access for cognitive radio networks
    Pirmoradian, Mahdi
    Adigun, Olayinka
    Politis, Christos
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (01):
  • [36] A Spectrum Access Based on Quality of Service (QoS) in Cognitive Radio Networks
    Zhai, Linbo
    Wang, Hua
    Gao, Chuangen
    [J]. PLOS ONE, 2016, 11 (05):
  • [37] A Spectrum Access Strategy for Cloud-based Cognitive Radio Networks
    Chen, Jiangjingxian
    Guo, Xin
    Zhang, Shibing
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2016,
  • [38] A Slot-Based Opportunistic Spectrum Access for Cognitive Radio Networks
    Zhai, Linbo
    Xie, Gang
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (11) : 3183 - 3185
  • [39] Trust Model-based Secure Cooperative Sensing Techniques for Cognitive Radio Networks
    Pang, Deming
    Hu, Gang
    Xu, Ming
    [J]. PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 1 - 6
  • [40] Secure Packet Transfer in Wireless Sensor Networks - A Trust-based Approach
    Reddy, Yenumula B.
    Selmic, Rastko
    [J]. PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 218 - 223