Skip to main content

Analysis of Trustworthiness and Link Budget Power Under Free Space Propagation Path Loss in Secured Cognitive Radio Ad hoc Network

  • Conference paper
  • First Online:
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 515))

  • 1126 Accesses

Abstract

The security issues of cognitive radio network have taken more attention recently due to the new challenges in wireless communication. Confronts related to such a debate seem more predominant in presence of the malicious secondary users when the transmission range of licensed users is shorter compared to the network size. In this paper, a model is introduced which verifies the distance both geographically and through the measuring distance obtained by received power of cognitive user. This is achieved by minimizing the interference to the primary licensed user and upon the faithful operation of the secondary user by calculating the trustworthiness of all users irrespective of their priority. This necessitates focus upon the free space propagation path loss of the transmitted signal. Thus, analysis of the trustworthiness becomes essential followed by calculation of link budget power that ensures the designing cost without extra overhead during a secured communication with the received power and free space propagation path loss.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sazia Parvin, Farook Khadree Husain, Omar Khadree Husain, SongHan, Biming Tian, and Elizabeth Chang: Cognitive Radio Network Security: A Survey. Elsevier Journal of Network and Computer Application. 1084–8045 (2012).

    Google Scholar 

  2. Theodore S. Rappaport: Wireless Communications Principals and Practice”, Second edition published by PEARSON Publication, Indian edition (2009).

    Google Scholar 

  3. Prasanna Venkatesan K. J. and Vijayarangan: Trust Based Algorithm for Secure Spectrum Access in Cognitive Radio Networks. K. R. Venugopal and L. M. Patnaik (Eds.) ICCN 2013, pp. 50–62 Elsevier Publications (2013).

    Google Scholar 

  4. Shrestha, Junu, Sunkara, Avinash, Thirunavukkarasu and Balaji: Security in Cognitive Radio. A project report to The Faculty of the Department of General Engineering of San Jose State University (2010).

    Google Scholar 

  5. Muhammad Faisal Amjad, Baber Aslam Afraa Attiah, and Cliff C. Zou: Towards trustworthy collaboration in spectrum sensing for ad hoc Cognitive Radio Networks. DOI:10.1007/s11276-015-1004-2 Springer Science & Business Media New York (2015).

  6. www.utexas.edu/research/mopro/papercopy/chapter11.pdf (Retrieved as on 26.04.2016).

  7. Jianwu Li, Zebing Feng, Zhiqing Wei, Zhiyong Feng, and Ping Zhang: Security Management Based on Trust Determination in Cognitive Radio Networks. DOI:10.1186/1687-6180-2014-48, EURASIP Journal on Advances in Signal Processing a Springer Open Journal (2014).

  8. Julius Goldhirsh and Wolfhard J. Vogel: Handbook of Propagation Effects for Vehicular and Personal Mobile Satellite Systems (1998).

    Google Scholar 

  9. M. A. Alim, M. M. Rahman, M. M. Hossain and A. Al-Nahid: Analysis of Large-Scale Propagation Models for Mobile Communications in Urban Area. ISSN: 1947-5500 Vol.7 No.1, International Journal of Computer Science and Information Security (IJCSIS) (2010).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashima Rout .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Rout, A., Kar, A., Sethi, S. (2017). Analysis of Trustworthiness and Link Budget Power Under Free Space Propagation Path Loss in Secured Cognitive Radio Ad hoc Network. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_46

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_46

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics