Abstract
Cognitive radio networks (CRNs) are becoming an important part of wireless communications, which can improve the utilization of the limited and scarce spectrum resources. However, the flexibility and the unique characteristics of CRN make it vulnerable to varied types of attack. Moreover, security is a key requirement at every step of its functionality (spectrum sensing, spectrum analysis, spectrum decision and spectrum act). Numerous researches have mainly focused on to provide security at the cognition capability (spectrum sensing, spectrum analysis and spectrum decision) of CRN for detecting the appropriate spectrum holes. However, after obtaining access to the spectrum hole (Spectrum Act), a Cognitive Radio (CR) may behave maliciously to achieve own benefits or for some other reasons. Such maliciousness can severely affect the normal activities of the whole network. Therefore, there is a need to track and record the behaviour during the spectrum access of a CR user, which can encourage the CR users to obey the opportunistic spectrum access policy. In this paper, we construct a trust-based approach for secure spectrum access in CRN. The CR nodes trust value is determined from its past activities, and based on which, it is decided whether the CR node will get access the primary users free spectrum or not.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Force, S.P.T.: Spectrum policy task force report. Technical Report 02-135, Federal Communications Commission (2002)
Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 23 (2005) 201–220
Bansal, T., Chen, B., Sinha, P.: Fastprobe: Malicious user detection in cognitive radio networks through active transmissions. In: IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada (2014) 2517–2525
Wang, W., Chen, L., Shin, K.G., Duan, L.: Secure cooperative spectrum sensing and access against intelligent malicious behaviors. In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014. (2014) 1267–1275
Attar, A., Tang, H., Vasilakos, A.V., Yu, F.R., Leung, V.C.M.: A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE 100 (2012) 3172–3186
Fragkiadakis, A.G., Tragos, E.Z., Askoxylakis, I.G.: A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys and Tutorials 15 (2013) 428–445
Kar, S., Sethi, S., Bhuyan, M.K.: Security challenges in cognitive radio network and defending against byzantine attack: a survey. IJCNDS 17 (2016) 120–146
Ishmanov, F., Kim, S.W., Nam, S.Y.: A secure trust establishment scheme for wireless sensor networks. Sensors 14 (2014) 1877–1897
Ishmanov, F., Kim, S.W., Nam, S.Y.: A robust trust establishment scheme for wireless sensor networks. Sensors 15 (2015) 7040–7061
Govindan, K., Mohapatra, P.: Trust computations and trust dynamics in mobile ad-hoc networks: A survey. IEEE Communications Surveys and Tutorials 14 (2012) 279–298
Pei, Q., Yuan, B., Li, L., Li, H.: A sensing and etiquette reputation-based trust management for centralized cognitive radio networks. Neurocomputing 101 (2013) 129–138
Parvin, S., Hussain, F.K., Hussain, O.K.: Conjoint trust assessment for secure communication in cognitive radio networks. Mathematical and Computer Modelling 58 (2013) 1340–1350
Pei, Q., Li, Z., Ma, L.: A trust value-based spectrum allocation algorithm in CWSNs. IJDSN 9 (2013)
Parvin, S., Han, S., Tian, B., Hussain, F.K.: Trust-based authentication for secure communication in cognitive radio networks. In: IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing. (2010) 589–596
Chen, K.C., Peng, Y.J., Prasad, N., Liang, Y.C., Sun, S.: Cognitive radio network architecture: Part I—General structure. In: Proceedings of the 2nd international conference on ubiquitous information management and communication, ACM (2008) 114–119
Chen, R., Park, J.M., Hou, Y., J.H. Reed: Toward secure distributed spectrum sensing in cognitive radio networks. Communications Magazine, IEEE 46 (2008) 50–55
He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: Retrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Information Technology in Biomedicine 16 (2012) 623–632
Kar, S., Sethi, S., Sahoo, R.K.: A multi-factor trust management scheme for secure spectrum sensing in cognitive radio networks. Wireless Personal Communications 97 (2017) 2523–2540
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kar, S., Sethi, S., Sahoo, R.K. (2018). A Trust-Based Technique for Secure Spectrum Access in Cognitive Radio Networks. In: Pattnaik, P., Rautaray, S., Das, H., Nayak, J. (eds) Progress in Computing, Analytics and Networking. Advances in Intelligent Systems and Computing, vol 710. Springer, Singapore. https://doi.org/10.1007/978-981-10-7871-2_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-7871-2_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7870-5
Online ISBN: 978-981-10-7871-2
eBook Packages: EngineeringEngineering (R0)