Skip to main content
Top
Published in: Wireless Personal Communications 4/2020

12-06-2020

Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network

Authors: Chettiyar Vani Vivekanand, K. Bhoopathy Bagan

Published in: Wireless Personal Communications | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Routing in cognitive radio networks (CRNs) faces numerous limitations in misbehaving activities and secure the routing requests and reply messages. In this research work, Secure Distance based Improved LEACH Routing (SDILR) protocol is presented to avoid the primary user emulation attack (PUEA) in CRN. Initially, the nodes in the cognitive radio network are clustered by using distance based improved Low- energy adaptive clustering hierarchy (ILEACH). After the formation of clusters, secure routing is presented using support value based signature authentication to avoid PUEA. The proposed secure ILEACH routing results the secure data sharing through the primary user nodes PUEA.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Arun, S., & Umamaheswari, G. (2019). An adaptive learning-based attack detection technique for mitigating primary user emulation in cognitive radio networks. Circuits, Systems, and Signal Processing,39, 1071–1088.CrossRef Arun, S., & Umamaheswari, G. (2019). An adaptive learning-based attack detection technique for mitigating primary user emulation in cognitive radio networks. Circuits, Systems, and Signal Processing,39, 1071–1088.CrossRef
2.
go back to reference Sharifi, M., Sharifi, A. A., & JavadMuseviNiya, M. (2018). Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: Multi-level hypotheses test approach. Wireless Networks,24(1), 61–68.CrossRef Sharifi, M., Sharifi, A. A., & JavadMuseviNiya, M. (2018). Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: Multi-level hypotheses test approach. Wireless Networks,24(1), 61–68.CrossRef
3.
go back to reference Venkatesan, K. J. P., & Vijayarangan, V. (2017). Secure and reliable routing in cognitive radio networks. Wireless Networks,23(6), 1689–1696.CrossRef Venkatesan, K. J. P., & Vijayarangan, V. (2017). Secure and reliable routing in cognitive radio networks. Wireless Networks,23(6), 1689–1696.CrossRef
4.
go back to reference Ghanem, W. R., Essam, R., Dessouky, M. (2018). Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks. In Proceedings of the 2018 35th National Radio Science Conference (NRSC) (pp. 309–318). IEEE. Ghanem, W. R., Essam, R., Dessouky, M. (2018). Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks. In Proceedings of the 2018 35th National Radio Science Conference (NRSC) (pp. 309–318). IEEE.
5.
go back to reference Ta, D.-T., Nguyen-Thanh, N., Maillé, P., & Nguyen, V.-T. (2018). Strategic surveillance against primary user emulation attacks in cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking,4(3), 582–596.CrossRef Ta, D.-T., Nguyen-Thanh, N., Maillé, P., & Nguyen, V.-T. (2018). Strategic surveillance against primary user emulation attacks in cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking,4(3), 582–596.CrossRef
6.
go back to reference Xie, X., & Wang, W. (2013). Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. Procedia Computer Science,21, 430–435.CrossRef Xie, X., & Wang, W. (2013). Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. Procedia Computer Science,21, 430–435.CrossRef
7.
go back to reference Madbushi, S., Raut, R., & Rukmini, M. S. S. (2018). Trust establishment in chaotic cognitive environment to improve attack detection accuracy under primary user emulation. Iranian Journal of Science and Technology, Transactions of Electrical Engineering,42(3), 291–297.CrossRef Madbushi, S., Raut, R., & Rukmini, M. S. S. (2018). Trust establishment in chaotic cognitive environment to improve attack detection accuracy under primary user emulation. Iranian Journal of Science and Technology, Transactions of Electrical Engineering,42(3), 291–297.CrossRef
8.
go back to reference Khaliq, S. B. A., Amjad, M. F., Abbas, H., Shafqat, N., & Afzal, H. (2019). Defence against PUE attacks in ad hoc cognitive radio networks: A mean field game approach. Telecommunication Systems,70(1), 123–140.CrossRef Khaliq, S. B. A., Amjad, M. F., Abbas, H., Shafqat, N., & Afzal, H. (2019). Defence against PUE attacks in ad hoc cognitive radio networks: A mean field game approach. Telecommunication Systems,70(1), 123–140.CrossRef
9.
go back to reference Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials,17(2), 1023–1043.CrossRef Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials,17(2), 1023–1043.CrossRef
10.
go back to reference El Alami, H., & Najid, A. (2018). MS-routing-G i: Routing technique to minimise energy consumption and packet loss in WSNs with mobile sink. IET Networks,7(6), 422–428.CrossRef El Alami, H., & Najid, A. (2018). MS-routing-G i: Routing technique to minimise energy consumption and packet loss in WSNs with mobile sink. IET Networks,7(6), 422–428.CrossRef
11.
go back to reference Zafar, S., Bashir, A., & Chaudhry, S. A. (2019). Mobility-aware hierarchical clustering in mobile wireless sensor networks. IEEE Access,7, 20394–20403.CrossRef Zafar, S., Bashir, A., & Chaudhry, S. A. (2019). Mobility-aware hierarchical clustering in mobile wireless sensor networks. IEEE Access,7, 20394–20403.CrossRef
12.
go back to reference Dutta, R., Gupta, S., & Das, M. K. (2014). Improvement on LEACH protocol in wireless sensor networks. International Journal of Computer Applications,97(21), 47–50. Dutta, R., Gupta, S., & Das, M. K. (2014). Improvement on LEACH protocol in wireless sensor networks. International Journal of Computer Applications,97(21), 47–50.
13.
go back to reference Al-Baz, A., & El-Sayed, A. (2018). A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks. International Journal of Communication Systems,31(1), e3407.CrossRef Al-Baz, A., & El-Sayed, A. (2018). A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks. International Journal of Communication Systems,31(1), e3407.CrossRef
14.
go back to reference Yousaf, A., Ahmad, F. Hamid, S., & Khan, F. (2019). Performance comparison of various LEACH protocols in wireless sensor networks. In Proceedings of the 2019 IEEE 15th International Colloquium on Signal Processing & Its Applications (CSPA) (pp. 108–113). IEEE. Yousaf, A., Ahmad, F. Hamid, S., & Khan, F. (2019). Performance comparison of various LEACH protocols in wireless sensor networks. In Proceedings of the 2019 IEEE 15th International Colloquium on Signal Processing & Its Applications (CSPA) (pp. 108–113). IEEE.
15.
go back to reference Kang, J., Sohn, I., & Lee, S. (2019). Enhanced message-passing based LEACH protocol for wireless sensor networks. Sensors,19(1), 75.CrossRef Kang, J., Sohn, I., & Lee, S. (2019). Enhanced message-passing based LEACH protocol for wireless sensor networks. Sensors,19(1), 75.CrossRef
16.
go back to reference Mirza, M. A., Ahmad, M., AsifHabib, M., Mahmood, N., Faisal, C. M. N., & Ahmad, U. (2018). CDCSS: Cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber-attacks. The Journal of Supercomputing,74(10), 5082–5098.CrossRef Mirza, M. A., Ahmad, M., AsifHabib, M., Mahmood, N., Faisal, C. M. N., & Ahmad, U. (2018). CDCSS: Cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber-attacks. The Journal of Supercomputing,74(10), 5082–5098.CrossRef
17.
go back to reference Manohar, A. L., Yau, K.-L. A., Ling, M. H., & Khan, S. (2019). A security-enhanced cluster size adjustment scheme for cognitive radio networks. IEEE Access,7, 117–130.CrossRef Manohar, A. L., Yau, K.-L. A., Ling, M. H., & Khan, S. (2019). A security-enhanced cluster size adjustment scheme for cognitive radio networks. IEEE Access,7, 117–130.CrossRef
18.
go back to reference Manesh, M. R., & Kaabouch, N. (2018). Security threats and countermeasures of MAC layer in cognitive radio networks. Ad Hoc Networks,70, 85–102.CrossRef Manesh, M. R., & Kaabouch, N. (2018). Security threats and countermeasures of MAC layer in cognitive radio networks. Ad Hoc Networks,70, 85–102.CrossRef
19.
go back to reference Li, Y., Ma, X., Wang, M., Chen, H., & Xie, L. (2019). Detecting primary user emulation attack based on multipath delay in cognitive radio network. Smart innovations in communication and computational sciences (pp. 361–373). Singapore: Springer.CrossRef Li, Y., Ma, X., Wang, M., Chen, H., & Xie, L. (2019). Detecting primary user emulation attack based on multipath delay in cognitive radio network. Smart innovations in communication and computational sciences (pp. 361–373). Singapore: Springer.CrossRef
20.
go back to reference Gupta, I., & Sahu, O. P. (2019). Mitigating Primary user emulation attacks using analytical model. Engineering vibration communication and information processing (pp. 219–227). Singapore: Springer.CrossRef Gupta, I., & Sahu, O. P. (2019). Mitigating Primary user emulation attacks using analytical model. Engineering vibration communication and information processing (pp. 219–227). Singapore: Springer.CrossRef
21.
go back to reference Behera, T., Samal, U. C., & Mohapatra, S. K. (2018). Energy-efficient modified LEACH protocol for IoT application. IET Wireless Sensor Systems,8(5), 223–228.CrossRef Behera, T., Samal, U. C., & Mohapatra, S. K. (2018). Energy-efficient modified LEACH protocol for IoT application. IET Wireless Sensor Systems,8(5), 223–228.CrossRef
22.
go back to reference Tsai, Y.-R. (2007). Coverage-preserving routing protocols for randomly distributed wireless sensor networks. IEEE Transactions on Wireless Communications,6(4), 1240–1245.CrossRef Tsai, Y.-R. (2007). Coverage-preserving routing protocols for randomly distributed wireless sensor networks. IEEE Transactions on Wireless Communications,6(4), 1240–1245.CrossRef
23.
go back to reference Jiang, Q-m, Chen, H.-F., Xie, L., & Wang, K. (2017). On detecting primary user emulation attack using channel impulse response in the cognitive radio network. Frontiers of Information Technology & Electronic Engineering,18(10), 1665–1676.CrossRef Jiang, Q-m, Chen, H.-F., Xie, L., & Wang, K. (2017). On detecting primary user emulation attack using channel impulse response in the cognitive radio network. Frontiers of Information Technology & Electronic Engineering,18(10), 1665–1676.CrossRef
Metadata
Title
Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network
Authors
Chettiyar Vani Vivekanand
K. Bhoopathy Bagan
Publication date
12-06-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07294-2

Other articles of this Issue 4/2020

Wireless Personal Communications 4/2020 Go to the issue