Skip to main content

A Trust-Based Technique for Secure Spectrum Access in Cognitive Radio Networks

  • Conference paper
  • First Online:
Progress in Computing, Analytics and Networking

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 710))

Abstract

Cognitive radio networks (CRNs) are becoming an important part of wireless communications, which can improve the utilization of the limited and scarce spectrum resources. However, the flexibility and the unique characteristics of CRN make it vulnerable to varied types of attack. Moreover, security is a key requirement at every step of its functionality (spectrum sensing, spectrum analysis, spectrum decision and spectrum act). Numerous researches have mainly focused on to provide security at the cognition capability (spectrum sensing, spectrum analysis and spectrum decision) of CRN for detecting the appropriate spectrum holes. However, after obtaining access to the spectrum hole (Spectrum Act), a Cognitive Radio (CR) may behave maliciously to achieve own benefits or for some other reasons. Such maliciousness can severely affect the normal activities of the whole network. Therefore, there is a need to track and record the behaviour during the spectrum access of a CR user, which can encourage the CR users to obey the opportunistic spectrum access policy. In this paper, we construct a trust-based approach for secure spectrum access in CRN. The CR nodes trust value is determined from its past activities, and based on which, it is decided whether the CR node will get access the primary users free spectrum or not.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Force, S.P.T.: Spectrum policy task force report. Technical Report 02-135, Federal Communications Commission (2002)

    Google Scholar 

  2. Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 23 (2005) 201–220

    Google Scholar 

  3. Bansal, T., Chen, B., Sinha, P.: Fastprobe: Malicious user detection in cognitive radio networks through active transmissions. In: IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada (2014) 2517–2525

    Google Scholar 

  4. Wang, W., Chen, L., Shin, K.G., Duan, L.: Secure cooperative spectrum sensing and access against intelligent malicious behaviors. In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014. (2014) 1267–1275

    Google Scholar 

  5. Attar, A., Tang, H., Vasilakos, A.V., Yu, F.R., Leung, V.C.M.: A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE 100 (2012) 3172–3186

    Google Scholar 

  6. Fragkiadakis, A.G., Tragos, E.Z., Askoxylakis, I.G.: A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys and Tutorials 15 (2013) 428–445

    Google Scholar 

  7. Kar, S., Sethi, S., Bhuyan, M.K.: Security challenges in cognitive radio network and defending against byzantine attack: a survey. IJCNDS 17 (2016) 120–146

    Google Scholar 

  8. Ishmanov, F., Kim, S.W., Nam, S.Y.: A secure trust establishment scheme for wireless sensor networks. Sensors 14 (2014) 1877–1897

    Google Scholar 

  9. Ishmanov, F., Kim, S.W., Nam, S.Y.: A robust trust establishment scheme for wireless sensor networks. Sensors 15 (2015) 7040–7061

    Google Scholar 

  10. Govindan, K., Mohapatra, P.: Trust computations and trust dynamics in mobile ad-hoc networks: A survey. IEEE Communications Surveys and Tutorials 14 (2012) 279–298

    Google Scholar 

  11. Pei, Q., Yuan, B., Li, L., Li, H.: A sensing and etiquette reputation-based trust management for centralized cognitive radio networks. Neurocomputing 101 (2013) 129–138

    Google Scholar 

  12. Parvin, S., Hussain, F.K., Hussain, O.K.: Conjoint trust assessment for secure communication in cognitive radio networks. Mathematical and Computer Modelling 58 (2013) 1340–1350

    Google Scholar 

  13. Pei, Q., Li, Z., Ma, L.: A trust value-based spectrum allocation algorithm in CWSNs. IJDSN 9 (2013)

    Google Scholar 

  14. Parvin, S., Han, S., Tian, B., Hussain, F.K.: Trust-based authentication for secure communication in cognitive radio networks. In: IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing. (2010) 589–596

    Google Scholar 

  15. Chen, K.C., Peng, Y.J., Prasad, N., Liang, Y.C., Sun, S.: Cognitive radio network architecture: Part I—General structure. In: Proceedings of the 2nd international conference on ubiquitous information management and communication, ACM (2008) 114–119

    Google Scholar 

  16. Chen, R., Park, J.M., Hou, Y., J.H. Reed: Toward secure distributed spectrum sensing in cognitive radio networks. Communications Magazine, IEEE 46 (2008) 50–55

    Google Scholar 

  17. He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: Retrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Information Technology in Biomedicine 16 (2012) 623–632

    Google Scholar 

  18. Kar, S., Sethi, S., Sahoo, R.K.: A multi-factor trust management scheme for secure spectrum sensing in cognitive radio networks. Wireless Personal Communications 97 (2017) 2523–2540

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumit Kar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kar, S., Sethi, S., Sahoo, R.K. (2018). A Trust-Based Technique for Secure Spectrum Access in Cognitive Radio Networks. In: Pattnaik, P., Rautaray, S., Das, H., Nayak, J. (eds) Progress in Computing, Analytics and Networking. Advances in Intelligent Systems and Computing, vol 710. Springer, Singapore. https://doi.org/10.1007/978-981-10-7871-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7871-2_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7870-5

  • Online ISBN: 978-981-10-7871-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics