Skip to main content
Erschienen in: Cluster Computing 5/2019

21.08.2017

Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks

verfasst von: S. Vimal, L. Kalaivani, M. Kaliappan

Erschienen in: Cluster Computing | Sonderheft 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Lu, L., Zhou, X., Onunkwo, U., Li, G.Y.: Ten years of research in spectrum sensing and sharing in cognitive radio. EURASIP J. Wire. Commun. Netw. 2012(1), 28 (2012)CrossRef Lu, L., Zhou, X., Onunkwo, U., Li, G.Y.: Ten years of research in spectrum sensing and sharing in cognitive radio. EURASIP J. Wire. Commun. Netw. 2012(1), 28 (2012)CrossRef
3.
Zurück zum Zitat Zhai, X., Zheng, L., Tan, C.W.: Energy-infeasibility tradeoffin cognitive radio net- works: price-driven spectrum access algorithms. IEEE J. Sel. Areas Commun. 32(3), 528–538 (2014). doi:10.1109/JSAC.2014.140313 CrossRef Zhai, X., Zheng, L., Tan, C.W.: Energy-infeasibility tradeoffin cognitive radio net- works: price-driven spectrum access algorithms. IEEE J. Sel. Areas Commun. 32(3), 528–538 (2014). doi:10.​1109/​JSAC.​2014.​140313 CrossRef
4.
Zurück zum Zitat Bourdenaa, A., Pallisb, E., Kormentzasa, G., Mastorakisc, G.: A prototype cognitive radio architecture for tvws exploitation under the real time secondary spectrum market policy. Phy. Commun. 10, 159–169 (2014). doi:10.1016/j.phycom.2013.11.003 CrossRef Bourdenaa, A., Pallisb, E., Kormentzasa, G., Mastorakisc, G.: A prototype cognitive radio architecture for tvws exploitation under the real time secondary spectrum market policy. Phy. Commun. 10, 159–169 (2014). doi:10.​1016/​j.​phycom.​2013.​11.​003 CrossRef
7.
Zurück zum Zitat Yang, D., Xue, G., Zhang, X.: Truthful group buying-based spectrum auction de- sign for cognitive radio networks. In: IEEE Int. Conf. Commun. (ICC), pp. 2295–2300. doi:10.1109/ICC.2014.6883665 (2014) Yang, D., Xue, G., Zhang, X.: Truthful group buying-based spectrum auction de- sign for cognitive radio networks. In: IEEE Int. Conf. Commun. (ICC), pp. 2295–2300. doi:10.​1109/​ICC.​2014.​6883665 (2014)
8.
Zurück zum Zitat Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: a survey. Phys. Commun. 4(1), 40–62 (2011)CrossRef Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: a survey. Phys. Commun. 4(1), 40–62 (2011)CrossRef
9.
Zurück zum Zitat Deng, J., Zhang, R.Q., Song, L.Y., Han, Z., Jiao, B.L.: Truthful mechanisms for secure communication in wireless cooperative system. IEEE Trans. Wirel. Commun. 12(9), 4236–4245 (2013)CrossRef Deng, J., Zhang, R.Q., Song, L.Y., Han, Z., Jiao, B.L.: Truthful mechanisms for secure communication in wireless cooperative system. IEEE Trans. Wirel. Commun. 12(9), 4236–4245 (2013)CrossRef
10.
Zurück zum Zitat Cha, J.C., Cheon, J.H.: Anidentity-based signature from gap Diffie–Hellman groups. In: Proceeding of 6th International Workshop on Practice and Theory in Public Key Cryptography, pp. 18–30 (2003) Cha, J.C., Cheon, J.H.: Anidentity-based signature from gap Diffie–Hellman groups. In: Proceeding of 6th International Workshop on Practice and Theory in Public Key Cryptography, pp. 18–30 (2003)
11.
Zurück zum Zitat Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks. IEEE J. Sel. Areas Commun 26(1), 25–37 (2008)CrossRef Chen, R., Park, J.M., Reed, J.H.: Defense against primary user emulation attacks. IEEE J. Sel. Areas Commun 26(1), 25–37 (2008)CrossRef
12.
Zurück zum Zitat Clancy, T., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: Proc. of IEEE/ICST Crown Comm, pp. 1–8 (2008) Clancy, T., Goergen, N.: Security in cognitive radio networks: threats and mitigation. In: Proc. of IEEE/ICST Crown Comm, pp. 1–8 (2008)
13.
Zurück zum Zitat Li, H., Han, Z.: Blind dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems with unknown channel statistics. In: Proc. IEEE ICC, pp. 1–6 (2010) Li, H., Han, Z.: Blind dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems with unknown channel statistics. In: Proc. IEEE ICC, pp. 1–6 (2010)
15.
Zurück zum Zitat Xing, X., Jing, T., Li, H., Huo, Y., Cheng, X., Znati, T.: Optimal spectrum sensing interval in cognitive radio networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2408–2417 (2014). doi:10.1109/TPDS.2013.155 CrossRef Xing, X., Jing, T., Li, H., Huo, Y., Cheng, X., Znati, T.: Optimal spectrum sensing interval in cognitive radio networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2408–2417 (2014). doi:10.​1109/​TPDS.​2013.​155 CrossRef
16.
Zurück zum Zitat Lee, K., Chae, C.-B., Kang, J.: Spectrum leasing via cooperation for enhanced physical-layer secrecy. IEEE Trans. Veh. Technol. 62(9), 4672–4678 (2013)CrossRef Lee, K., Chae, C.-B., Kang, J.: Spectrum leasing via cooperation for enhanced physical-layer secrecy. IEEE Trans. Veh. Technol. 62(9), 4672–4678 (2013)CrossRef
17.
Zurück zum Zitat Andersson, A., Tenhunen, M., Ygge, F.: Integer programming for combinatorial auction winner determination. In: Proc. Fourth International Conference on Multi-Agent Systems (ICMAS), Boston, MA, pp. 39–46 (2000) Andersson, A., Tenhunen, M., Ygge, F.: Integer programming for combinatorial auction winner determination. In: Proc. Fourth International Conference on Multi-Agent Systems (ICMAS), Boston, MA, pp. 39–46 (2000)
18.
Zurück zum Zitat Wang, H.B., Gao, L., Gan, X.Y., Wang, X.B., Hossain, E.: Cooperative spectrum sharing in cognitive radio networks: a game-theoretic approach. In: Proceedings of IEEE International Conference on Communications, IEEE, Cape Town, South Africa, pp. 23–27 (2010) Wang, H.B., Gao, L., Gan, X.Y., Wang, X.B., Hossain, E.: Cooperative spectrum sharing in cognitive radio networks: a game-theoretic approach. In: Proceedings of IEEE International Conference on Communications, IEEE, Cape Town, South Africa, pp. 23–27 (2010)
19.
Zurück zum Zitat Alahmadi, A., Abdelhakim, M., Ren, J., Li, T.: Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Trans. Inf. Forensics Secur. 9(5), 772–781 (2014)CrossRef Alahmadi, A., Abdelhakim, M., Ren, J., Li, T.: Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Trans. Inf. Forensics Secur. 9(5), 772–781 (2014)CrossRef
20.
Zurück zum Zitat Yu, F., Tang, H., Huang, M., Li, Zh., Mason, P.C.: Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: IEEE Military Communications Conference MILCOM, Boston, USA, pp. 1–7 ( 2009) Yu, F., Tang, H., Huang, M., Li, Zh., Mason, P.C.: Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: IEEE Military Communications Conference MILCOM, Boston, USA, pp. 1–7 ( 2009)
21.
Zurück zum Zitat Khasawneh M., Kajman I., Alkhudaidy R., Althubyani A.: A survey on wi-fi protocols: WPA and WPA2. In: International Conference on Security in Computer Networks and Distributed Systems, SNDS, pp. 496–511 (2014) Khasawneh M., Kajman I., Alkhudaidy R., Althubyani A.: A survey on wi-fi protocols: WPA and WPA2. In: International Conference on Security in Computer Networks and Distributed Systems, SNDS, pp. 496–511 (2014)
22.
Zurück zum Zitat Alrabaee, S., Khasawneh, M., Agarwal, A., Goel, N., Zaman, M.: Advances in Wireless Technologies and Telecommunication. IGI Global, Hershey (2014) Alrabaee, S., Khasawneh, M., Agarwal, A., Goel, N., Zaman, M.: Advances in Wireless Technologies and Telecommunication. IGI Global, Hershey (2014)
23.
Zurück zum Zitat Kaliappan, M., Paramasivam, B.: Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model. Comput. Electr. Eng. 41, 301–313 (2015)CrossRef Kaliappan, M., Paramasivam, B.: Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model. Comput. Electr. Eng. 41, 301–313 (2015)CrossRef
24.
Zurück zum Zitat Paramasivan, B., Prakash, M.J.V., Kaliappan, M.: Development of a secure routing protocol using game theory model in mobile ad hoc networks. J. Commun. Netw. 17(1), 75–83 (2015) Paramasivan, B., Prakash, M.J.V., Kaliappan, M.: Development of a secure routing protocol using game theory model in mobile ad hoc networks. J. Commun. Netw. 17(1), 75–83 (2015)
25.
Zurück zum Zitat Vidhyarani, P., Vimal, S.: Defense against Routing towards Primary User attack in Cognitive Radio Networks. In: TCIFES 2015 International Conference on Technological Convergence For Information, Food, Health and Energy Security (2015) Vidhyarani, P., Vimal, S.: Defense against Routing towards Primary User attack in Cognitive Radio Networks. In: TCIFES 2015 International Conference on Technological Convergence For Information, Food, Health and Energy Security (2015)
26.
Zurück zum Zitat Vimal, S., Kalaivani, L.: Secure Authentication mechanisms to mitigate PUE attacks for mobile Cognitive Radio networks. In: IEEE,IEEE CSI,IEEE-ITS & BRNS sponsored International Conference on Computing Technologies and Intelligent Data Engineering (2016) Vimal, S., Kalaivani, L.: Secure Authentication mechanisms to mitigate PUE attacks for mobile Cognitive Radio networks. In: IEEE,IEEE CSI,IEEE-ITS & BRNS sponsored International Conference on Computing Technologies and Intelligent Data Engineering (2016)
27.
Zurück zum Zitat Vimal, S., Kalaivani, L.: A stochastic game theoretical approach for jamming attack in cognitive radio network using WQLA. In: International Conference on Advanced Information and Communication Technology (ICAIC’17) (2017) Vimal, S., Kalaivani, L.: A stochastic game theoretical approach for jamming attack in cognitive radio network using WQLA. In: International Conference on Advanced Information and Communication Technology (ICAIC’17) (2017)
28.
Zurück zum Zitat Veeramakali, T., Jayashri, S., Prabu, S.: Intelligent dynamic spectrum allocation with bandwidth flexibility in cognitive radio network. Clust. Comput. 20(2), 1575–1586 (2017)CrossRef Veeramakali, T., Jayashri, S., Prabu, S.: Intelligent dynamic spectrum allocation with bandwidth flexibility in cognitive radio network. Clust. Comput. 20(2), 1575–1586 (2017)CrossRef
29.
Zurück zum Zitat Chen, C.Y., Hsu, S.W., Chao, H.C.: CogIMS: an active service-oriented cognitive networks over IP multimedia subsystems. Clust. Comput. 18(1), 135–145 (2015)CrossRef Chen, C.Y., Hsu, S.W., Chao, H.C.: CogIMS: an active service-oriented cognitive networks over IP multimedia subsystems. Clust. Comput. 18(1), 135–145 (2015)CrossRef
30.
Zurück zum Zitat Ykhlef, M., Alqifari, R.: A new hybrid algorithm to solve winner determination problem in multiunit double internet auction. Math. Probl. Eng. doi:10.1155/2015/639787 (2015) Ykhlef, M., Alqifari, R.: A new hybrid algorithm to solve winner determination problem in multiunit double internet auction. Math. Probl. Eng. doi:10.​1155/​2015/​639787 (2015)
31.
Zurück zum Zitat Achour, K., Slaouti, L., Boughaci, D.: A metacomputing approach for the winner determination problem in combinatorial auctions. In: 2010 International Conference on Machine and Web Intelligence, Algiers, pp. 485– 488. doi:10.1109/ICMWI.2010.5647909 (2010) Achour, K., Slaouti, L., Boughaci, D.: A metacomputing approach for the winner determination problem in combinatorial auctions. In: 2010 International Conference on Machine and Web Intelligence, Algiers, pp. 485– 488. doi:10.​1109/​ICMWI.​2010.​5647909 (2010)
Metadaten
Titel
Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks
verfasst von
S. Vimal
L. Kalaivani
M. Kaliappan
Publikationsdatum
21.08.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 5/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1092-0

Weitere Artikel der Sonderheft 5/2019

Cluster Computing 5/2019 Zur Ausgabe