Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

23.05.2019

Detecting and Mitigating Selfish Primary Users in Cognitive Radio

verfasst von: Avila Jayapalan, Prem Savarinathan, Padmapriya Praveenkumar, Thenmozhi Karuppasamy

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, the cognitive radio has become a promising solution for spectrum shortage disputes and to achieve dynamic spectrum access. This study focuses on two things: The first aim of this study is the integrity check to be carried when accepting new cognitive users or accept cognitive user who wish to re-join the group. In spite of these checks and after entering the group, some cognitive users turn out to be selfish after accessing the group. Hence the second goal is how to mitigate the attack caused by the selfish malicious user with the help of collaborator node. The collaborator node senses the spectrum and conveys the message along with the authentication tag. The information with the tag is accepted by the cognitive radio.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Force, S. P. T. (2002). Spectrum policy task force report. Federal Communications Commission ET Docket No. 02–135. Force, S. P. T. (2002). Spectrum policy task force report. Federal Communications Commission ET Docket No. 02–135.
2.
Zurück zum Zitat Federal Communications Commission (2003). Facilitating opportunities for flexible, efficient and reliable spectrum use employing cognitive radio technologies, notice of proposed rulemaking and order, FCC 03–322. Federal Communications Commission (2003). Facilitating opportunities for flexible, efficient and reliable spectrum use employing cognitive radio technologies, notice of proposed rulemaking and order, FCC 03–322.
3.
Zurück zum Zitat Liu, Y., Zhong, Z., Wang, G., & Hu, D. (2015). Cyclostationary detection based spectrum sensing for cognitive radio networks. Journal of Communications, 10(1), 74–79.CrossRef Liu, Y., Zhong, Z., Wang, G., & Hu, D. (2015). Cyclostationary detection based spectrum sensing for cognitive radio networks. Journal of Communications, 10(1), 74–79.CrossRef
4.
Zurück zum Zitat Vadivelu, R., Sankaranarayanan, K., & Vijaykumar, V. (2014). Matched filter based spectrum sensing for cognitive radio at low signal to noise ratio. Journal of Theoretical and Applied Information Technology, 62(1), 107–113. Vadivelu, R., Sankaranarayanan, K., & Vijaykumar, V. (2014). Matched filter based spectrum sensing for cognitive radio at low signal to noise ratio. Journal of Theoretical and Applied Information Technology, 62(1), 107–113.
5.
Zurück zum Zitat Kaur, P., & Singh, C. (2015). Spectrum sensing based on energy detection in cognitive radio. International Journal of Advanced Research in Electronics and Communication Engineering, 4(5), 1214–1217. Kaur, P., & Singh, C. (2015). Spectrum sensing based on energy detection in cognitive radio. International Journal of Advanced Research in Electronics and Communication Engineering, 4(5), 1214–1217.
6.
Zurück zum Zitat Diaconu, A. V., & Loukhaoukha, K. (2013). An Improved secure image encryption algorithm based on Rubik’s cube principle and digital chaotic cipher. Mathematical Problems in Engineering, 2013, 1–10.MathSciNetCrossRef Diaconu, A. V., & Loukhaoukha, K. (2013). An Improved secure image encryption algorithm based on Rubik’s cube principle and digital chaotic cipher. Mathematical Problems in Engineering, 2013, 1–10.MathSciNetCrossRef
7.
Zurück zum Zitat Siddaramappa, V., Ramesh, K. B. (2015). Cryptography and bioinformatics techniques for secure information transmission over insecure channels. In International conference on applied and theoretical computing and communication technology (iCATccT) (pp. 137–139). Siddaramappa, V., Ramesh, K. B. (2015). Cryptography and bioinformatics techniques for secure information transmission over insecure channels. In International conference on applied and theoretical computing and communication technology (iCATccT) (pp. 137–139).
8.
Zurück zum Zitat Alahmadi, A., Abdelhakim, M., Ren, J., & Li, T. (2014). Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Transactions on Information Forensics and Security, 9(5), 772–781.CrossRef Alahmadi, A., Abdelhakim, M., Ren, J., & Li, T. (2014). Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Transactions on Information Forensics and Security, 9(5), 772–781.CrossRef
9.
Zurück zum Zitat Borle, K. M., Chen, B., Du, W. (2013). A physical layer authentication scheme for countering primary user emulation attack. In IEEE international conference on acoustics, speech and signal processing (pp. 2935–2939). Borle, K. M., Chen, B., Du, W. (2013). A physical layer authentication scheme for countering primary user emulation attack. In IEEE international conference on acoustics, speech and signal processing (pp. 2935–2939).
10.
Zurück zum Zitat Chandrashekar, S., Lazos, L. (2010). A primary user authentication system for mobile cognitive radio networks. In 3rd international symposium on applied sciences in biomedical and communication technologies (pp. 1–5). Chandrashekar, S., Lazos, L. (2010). A primary user authentication system for mobile cognitive radio networks. In 3rd international symposium on applied sciences in biomedical and communication technologies (pp. 1–5).
11.
Zurück zum Zitat Chen, R., Park, J. M., & Reed, J. H. (2008). Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 26(1), 25–37.CrossRef Chen, R., Park, J. M., & Reed, J. H. (2008). Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 26(1), 25–37.CrossRef
12.
Zurück zum Zitat Pu, D., & Wyglinski, A. M. (2014). Primary-user emulation detection using database-assisted frequency-domain action recognition. IEEE Transactions on Vehicular Technology, 63(9), 4372–4382.CrossRef Pu, D., & Wyglinski, A. M. (2014). Primary-user emulation detection using database-assisted frequency-domain action recognition. IEEE Transactions on Vehicular Technology, 63(9), 4372–4382.CrossRef
13.
Zurück zum Zitat Jin, Z., Anand, S., Subbalakshmi, K. P. (2009). Detecting primary user emulation attacks in dynamic spectrum access networks. In IEEE international conference on communications (pp. 1–5). Jin, Z., Anand, S., Subbalakshmi, K. P. (2009). Detecting primary user emulation attacks in dynamic spectrum access networks. In IEEE international conference on communications (pp. 1–5).
14.
Zurück zum Zitat Dang, M., Zhao, Z., Zhang H. (2013). Detection of primary user emulation attacks based on compressive sensing in cognitive radio networks. In International conference on wireless communications & signal processing (pp. 1–5). Dang, M., Zhao, Z., Zhang H. (2013). Detection of primary user emulation attacks based on compressive sensing in cognitive radio networks. In International conference on wireless communications & signal processing (pp. 1–5).
15.
Zurück zum Zitat Liu, Y., Ning, P., Dai, H. (2010). Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In IEEE symposium on security and privacy (pp. 286–301). Liu, Y., Ning, P., Dai, H. (2010). Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In IEEE symposium on security and privacy (pp. 286–301).
16.
Zurück zum Zitat Alahmadi, A., Abdelhakim, M., Ren, J., Li, T. (2013). Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. In IEEE global communications conference (pp. 3329–3334). Alahmadi, A., Abdelhakim, M., Ren, J., Li, T. (2013). Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. In IEEE global communications conference (pp. 3329–3334).
17.
Zurück zum Zitat Alom, M. Z., Godder, T. K., Morshed, M. N., Maali, A. (2017). Enhanced spectrum sensing based on energy detection in cognitive radionetwork using adaptive threshold. In International conference on networking, systems and security (NSysS) (pp. 138–143). Alom, M. Z., Godder, T. K., Morshed, M. N., Maali, A. (2017). Enhanced spectrum sensing based on energy detection in cognitive radionetwork using adaptive threshold. In International conference on networking, systems and security (NSysS) (pp. 138–143).
18.
Zurück zum Zitat Eslami, A., Karamzadeh, S. (2016). Memory based energy detection spectrum sensing method in cognitive radio driven hospitals. In Advances in wireless and optical communications (RTUWO) (pp. 111–115). Eslami, A., Karamzadeh, S. (2016). Memory based energy detection spectrum sensing method in cognitive radio driven hospitals. In Advances in wireless and optical communications (RTUWO) (pp. 111–115).
19.
Zurück zum Zitat Zhang, B. Y., Gong, G. (2013). Randomness properties of stream ciphers for wireless communications. In The sixth international workshop on signal design and its application in communications (pp. 107–109). Zhang, B. Y., Gong, G. (2013). Randomness properties of stream ciphers for wireless communications. In The sixth international workshop on signal design and its application in communications (pp. 107–109).
20.
Zurück zum Zitat Guo, Q., & Wang, G. (2010). Generation of a chaos-based PN sequence and its quality analysis. International Conference on Communications, Circuits and Systems, 2010, 756–759. Guo, Q., & Wang, G. (2010). Generation of a chaos-based PN sequence and its quality analysis. International Conference on Communications, Circuits and Systems, 2010, 756–759.
21.
Zurück zum Zitat Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Stefan, L., et al. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications. Special Publication (pp. 800–22), Revision 1a: 1-131. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Stefan, L., et al. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications. Special Publication (pp. 800–22), Revision 1a: 1-131.
Metadaten
Titel
Detecting and Mitigating Selfish Primary Users in Cognitive Radio
verfasst von
Avila Jayapalan
Prem Savarinathan
Padmapriya Praveenkumar
Thenmozhi Karuppasamy
Publikationsdatum
23.05.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06602-9

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt