Green Cooperative Web of Trust for Security in Cognitive Radio Networks
DOI:
https://doi.org/10.13052/jcsm2245-1439.236Keywords:
Cooperative Spectrum Sensing, Cognitive Radio Network (CRN), Cooperative Web of Trust (CWoT), Wireless Sensor Network (WSN), etcAbstract
Spectrum is a scarce and very essential resource for the ever growing mobile communication applications. Radio networks (CRN) is the best evolved solution towards spectrum scarcity. Cooperative spectrum sensing is a well-known and proven mechanism in the CRNs. As compared to other traditional wireless networks, CRNs are more delicate and open to the wireless environments due to their heterogeneous nature. Therefore, the CRNs have more security threats than the conventional wireless networks. The spectrum sensing and sharing mechanisms are inherently vulnerable to the malicious behaviors in the wireless networks due to its openness. This paper proposes an energy efficient lightweight cryptographic Cooperative web of trust (CWoT) for the spectrum sensing in CRNs which is proved to be appropriate for the resource constrained wireless sensor networks (WSNs). Development of trust based authentication and authorization mechanism for the opportunistic large array (OLA) structured CRNs is the main objective of this paper. Received signal strength (RSS) values obtained can be utilized to avoid Primary user emulation attacks (PUEA) in CRNs.
Downloads
References
J. Mitola. Cognitive radio architecture evolution, Proceedings of IEEE Journals and Magazines, vol. 97, Issue 4, pp. 626-641, Apr. 2009.
J. L. Burbank. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network, 3rd International conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom 2008, pp. 1-7.
K-C Chen et al. Cognitive radio network architecture: part I-general structure, In the Proceedings of the 2nd international conference on ubiquitous information management and communication, Suwon, Korea, 2008a, pp.114–119.
S. Parvin, F. Khadeer Hussain, O. K. Hussain, S. Han, B. Tian, E. Chang. Cognitive radio network security: A survey, Journal of Network and Computer Applications, Vol.35, Issue. 06, November 2012, pp. 1691–1708.
MIB Shahid, J. Kamruzzaman. Weighted soft decision for cooperative sensing in cognitive radio networks”, 16th IEEE international conference on networks (ICON), New Delhi, 2008, pp. 1–6.
A. M. Wyglinski, M. Nekovee, Y. T. Hou. Cognitive Radio Communications and Networks: Principles and Practice”, Elsevier, Dec 2009.
O. Leon, J. Hernandez-Serrano and M. Soriano. Securing Cognitive Radio Networks, International Journal of Communication Systems, Wiley InterScience, vol. 23, pp. 633–652, 2010.
W. Wang, Y. (L.) Sun, H. Li and Z. Han. Cross-Layer Attack and Defense in Cognitive Radio Networks, IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1–6, 2010.
S. Parvin and F. K. Hussain. Trust-Based Security for Community Based Cognitive Radio Networks, 26th IEEE Conference on Advanced Information Networking and Applications, pp. 518–525, 2012.
R. Dubey, S. Sharma, and L. Chouhan. Secure and Trusted Algorithm for Cognitive Radio Networks, Ninth International Conference on Wireless and Optical Communication Networks (WOCN), pp. 1–7, 2012.
S. Parvin, S. Han, F. K. Hussain, Md. A. A. Faruque. Trust Based Security for Cognitive Radio Networks, Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, pp 743–748, 2010.
H. Rifà-Pous, C. Garrigues. A Secure and Anonymous Cooperative Sensing Protocol For Cognitive Radio Networks, ACMSIN'11, Proceedings of the 4th international conference on Security of information and networks, pp 127–132.
I. F. Akyildiz, Brandon F. Lo, Ravikumar Balakrishnan. Cooperative spectrum sensing in cognitive radio networks: A survey”, Elsevier Science Direct Physical Communication 4, 2011, pp. 40–62.
V. Rohokale, N. Kulkarni, N. Prasad, H. Cornean. Cooperative Opportunistic Large Array Approach for Cognitive Radio Networks, 8th International conference on communications, COMM 2010, pp. 513–516.
W. Guo-feng, Z. Shi-lei, H. Xiao-ning and H. Han-Ying. A Trust Mechanism-based Secure Cooperative Spectrum Sensing Scheme in Cognitive Radio Networks”, ESEP 2011: 9–10 December 2011, Singapore.
J. Hong, Y. Qing-song, L. Hui. Simulation and Analysis of MAC Security Based on NS2, IEEE International Conference on Multimedia Information Networking and Security, vol.2, pp. 502–505, 2009.
S. Misra, A. Vaish. Reputation-based role assignment for role based access control in wireless sensor networks, Computer Communications 34 (2011), pp.281–294, 2011.
J. U. Duncombe. Infrared navigation-Part I: An assessment of feasibility (Periodical style), IEEE Tranactions on Electron Devices, vol.11, pp. 34–39, Jan. 1959.
D. Liu, P. Ning. Security for Wireless Sensor Networks, Book Series in Advances in Information Security, Springer, ISBN 978-0-387-46781-8, vol.28, 2007.
Y. Mao, M. Wu. Tracing Malicious Relays in Cooperative Wireless Communications, IEEE Transactions on Information Forensics and Security, Vol. 2, No. 2, pp. 198–212, June 2009.
M. Merro and E. Sibilio. A Caluculus of Trustworthy Ad-hoc Networks”, Springer-Verlag Berlin Heidelberg, pp. 157–172, 2010.