Skip to main content
Top
Published in: Electronic Commerce Research 1/2015

01-03-2015

Securing coalitional game for distributed cooperative spectrum sensing in multi-channel cognitive radio networks

Authors: Behzad Kasiri, Jun Cai, Attahiru S. Alfa

Published in: Electronic Commerce Research | Issue 1/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, a secure scheme is purposed for coalitional game in multi-channel cognitive radio networks. First, a distributed cooperative attack on multi-channel cooperative spectrum sensing is proposed. In the proposed attack, attackers play two coalitional games to maximize the number of invaded channels in a distributed manner. In the first game, attackers play with their fellow ones to allocate an optimal number of attackers for each channel, while in the second game, they play in the coalitions with other honest cognitive radios so as to conquer as many channels as possible. Then, a hierarchical ID-based key management scheme is proposed, where cognitive radios can only play on a certain number of requested channels and channel access for sensing is limited to the honest cognitive radios selected in the coalitional game. Simulation results show that the proposed attack can considerably decrease the number of potential channels with a low attack cost when security scheme is not considered, in addition to the energy efficiency of the proposed key management scheme. Finally, formal verification of the proposed key management scheme guarantees its immunity and effectiveness.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Federal Communications Commission. (2002). Spectrum policy task force report, FCC 02–155. Federal Communications Commission. (2002). Spectrum policy task force report, FCC 02–155.
2.
go back to reference Zhao, Q., & Sadler, B. M. (2007). A survey of dynamic spectrum access: Signal processing, networking, and regulatory policy. IEEE Signal Processing Magazine, 24, 79–89.CrossRef Zhao, Q., & Sadler, B. M. (2007). A survey of dynamic spectrum access: Signal processing, networking, and regulatory policy. IEEE Signal Processing Magazine, 24, 79–89.CrossRef
3.
go back to reference Cabric, D., & Brodersen, S. W. (2005). Implementation issues in spectrum sensing for cognitive radios. The 38th Asilomar Conference on Signals, Systems, and Computers, (pp. 124–130), Pacific Grove, CA, USA. Cabric, D., & Brodersen, S. W. (2005). Implementation issues in spectrum sensing for cognitive radios. The 38th Asilomar Conference on Signals, Systems, and Computers, (pp. 124–130), Pacific Grove, CA, USA.
4.
go back to reference Urkowitz, H. (1967). Energy detection of unknown deterministic signals. Proceedings of IEEE, 55, 523–231.CrossRef Urkowitz, H. (1967). Energy detection of unknown deterministic signals. Proceedings of IEEE, 55, 523–231.CrossRef
5.
go back to reference Zhang, W., & Letaief, K. (2008). Cooperative spectrum sensing with transmit and relay diversity in cognitive networks. IEEE Transactions on Wireless Communications, 7, 4761–4766.CrossRef Zhang, W., & Letaief, K. (2008). Cooperative spectrum sensing with transmit and relay diversity in cognitive networks. IEEE Transactions on Wireless Communications, 7, 4761–4766.CrossRef
6.
go back to reference Wang, W., Kasiri, B., Cai, J., & Alfa, A.S. (2010). Distributed cooperative multi-channel spectrum sensing based on a dynamic coalitional game. IEEE Global Communications Conference (GLOBECOM’10), (pp. 589–600), Miami, FL, USA. Wang, W., Kasiri, B., Cai, J., & Alfa, A.S. (2010). Distributed cooperative multi-channel spectrum sensing based on a dynamic coalitional game. IEEE Global Communications Conference (GLOBECOM’10), (pp. 589–600), Miami, FL, USA.
7.
go back to reference Isaac, J. T., Zeadally, S., & Camara, J. S. (2012). A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs). Electronic Commerce Research, Springer, 12(1), 97–123. Isaac, J. T., Zeadally, S., & Camara, J. S. (2012). A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs). Electronic Commerce Research, Springer, 12(1), 97–123.
8.
go back to reference Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: A trust model. Electronic Commerce Research, Springer, 4(4), 359–372. Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: A trust model. Electronic Commerce Research, Springer, 4(4), 359–372.
9.
go back to reference Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. IEEE Int’l Conf. on Computer Commun. (INFOCOM’08), (pp. 1876–1884), Phoenix, AZ, USA. Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. IEEE Int’l Conf. on Computer Commun. (INFOCOM’08), (pp. 1876–1884), Phoenix, AZ, USA.
10.
go back to reference Rawat, A.S., Anand, P., Hao, C., & Varshney, P.K. (2010). Countering byzantine attacks in cognitive radio networks. 2010 IEEE Int’l Conference on Acoustics Speech and Signal Processing (ICASSP’10), (pp. 3098–3101), Dallas, TX, USA. Rawat, A.S., Anand, P., Hao, C., & Varshney, P.K. (2010). Countering byzantine attacks in cognitive radio networks. 2010 IEEE Int’l Conference on Acoustics Speech and Signal Processing (ICASSP’10), (pp. 3098–3101), Dallas, TX, USA.
11.
go back to reference Rawat, A. S., Anand, P., Hao, C., & Varshney, P. K. (2011). Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Transactions on Signal Processing, 59(2), 774–786.CrossRef Rawat, A. S., Anand, P., Hao, C., & Varshney, P. K. (2011). Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Transactions on Signal Processing, 59(2), 774–786.CrossRef
12.
go back to reference He, X., Dai, H., & Ning, P. (2012). A byzantine attack defender: The conditional frequency check. IEEE Int’l Symposium on Information Theory (ISIT’12), (pp. 975–979), Boston, MA, USA. He, X., Dai, H., & Ning, P. (2012). A byzantine attack defender: The conditional frequency check. IEEE Int’l Symposium on Information Theory (ISIT’12), (pp. 975–979), Boston, MA, USA.
13.
go back to reference Du, R., Foo, E., & Boyd, C. (2008). Designing a secure e-tender submission protocol. Electronic Commerce Research, Springer, 8(3), 115–142. Du, R., Foo, E., & Boyd, C. (2008). Designing a secure e-tender submission protocol. Electronic Commerce Research, Springer, 8(3), 115–142.
14.
go back to reference Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Springer Lecture Notes in Computer Science, 196, 4753. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Springer Lecture Notes in Computer Science, 196, 4753.
15.
go back to reference Tan, Z. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, Springer, 12(4), 505–518. Tan, Z. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, Springer, 12(4), 505–518.
16.
go back to reference Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612.CrossRef Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612.CrossRef
17.
go back to reference Tan, E. C., Leong, P. C., & Sio, L. T. (2008). Group-access control of confidential files in e-commerce management using shared-secret scheme. Electronic Commerce Research, Springer, 2(1–2), 151–158. Tan, E. C., Leong, P. C., & Sio, L. T. (2008). Group-access control of confidential files in e-commerce management using shared-secret scheme. Electronic Commerce Research, Springer, 2(1–2), 151–158.
19.
go back to reference Boneh, D., & Franklin, M. (2001). Identity based encryption from the Weil pairing. Springer Lecture Notes in Computer Science, 2139, 213229. Boneh, D., & Franklin, M. (2001). Identity based encryption from the Weil pairing. Springer Lecture Notes in Computer Science, 2139, 213229.
20.
go back to reference Zhao, Q., Tong, L., Swami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework. IEEE JSAC, 25(3), 589–600. Zhao, Q., Tong, L., Swami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework. IEEE JSAC, 25(3), 589–600.
21.
go back to reference Ghasemi, A., & Sousa, E. (2005). Collaborative spectrum sensing for opportunistic access in fading environments. IEEE DySPAN’05, Baltimore, MD, USA. Ghasemi, A., & Sousa, E. (2005). Collaborative spectrum sensing for opportunistic access in fading environments. IEEE DySPAN’05, Baltimore, MD, USA.
22.
go back to reference Ahmed, S., Hossain, M. S., Abdullah, M., & Hossain, M. A. (2012). Cooperative spectrum sensing over Rayleigh fading channel in cognitive radio. International Journal of Electronics and Computer Science Engineering, 1(4), 2583–2592. Ahmed, S., Hossain, M. S., Abdullah, M., & Hossain, M. A. (2012). Cooperative spectrum sensing over Rayleigh fading channel in cognitive radio. International Journal of Electronics and Computer Science Engineering, 1(4), 2583–2592.
23.
go back to reference Ghasemi, A., & Sousa, (2007). Opportunistic spectrum access in fading channels through collaborative sensing. Journal of Communications, 2(2), 71–82.CrossRef Ghasemi, A., & Sousa, (2007). Opportunistic spectrum access in fading channels through collaborative sensing. Journal of Communications, 2(2), 71–82.CrossRef
24.
go back to reference Shen, J., Liu, S., Zeng, L., Xie, G., Gao, J., & Liu, Y. (2009). Optimization of cooperative spectrum sensing in cognitive radio network. IET Communications, 3(7), 1170–1178.CrossRef Shen, J., Liu, S., Zeng, L., Xie, G., Gao, J., & Liu, Y. (2009). Optimization of cooperative spectrum sensing in cognitive radio network. IET Communications, 3(7), 1170–1178.CrossRef
25.
go back to reference Isheden, C., & Fettweis, G. P. (2010). Energy-efficient multi-carrier link adaptation with sum rate-dependent circuit power. IEEE Global Telecommunications Conference (GLOBECOM’10), (pp. 1–6), Miami, FL, USA. Isheden, C., & Fettweis, G. P. (2010). Energy-efficient multi-carrier link adaptation with sum rate-dependent circuit power. IEEE Global Telecommunications Conference (GLOBECOM’10), (pp. 1–6), Miami, FL, USA.
26.
go back to reference Bloem, M., Alpcan, T. & Basar, T. (2007). A Stackelberg game for power control and channel allocation in cognitive radio networks. Int’l ICST Workshop on Game Theory in Communication Networks (GameComm’07), France. Bloem, M., Alpcan, T. & Basar, T. (2007). A Stackelberg game for power control and channel allocation in cognitive radio networks. Int’l ICST Workshop on Game Theory in Communication Networks (GameComm’07), France.
27.
go back to reference Myerson, R. (1991). Game theory, analysis and conflict. Cambridge, MA: Harvard University Press. Myerson, R. (1991). Game theory, analysis and conflict. Cambridge, MA: Harvard University Press.
28.
go back to reference Apt, G. P., & Witzel, A. (2006). A generic approach to coalition formation. Proceedings of COMSOC’06, Amsterdam, the Netherlands. Apt, G. P., & Witzel, A. (2006). A generic approach to coalition formation. Proceedings of COMSOC’06, Amsterdam, the Netherlands.
29.
go back to reference Boyd, S., & Vandenberghe, L. (2004). Convex optimization. New York: Cambridge University Press.CrossRef Boyd, S., & Vandenberghe, L. (2004). Convex optimization. New York: Cambridge University Press.CrossRef
30.
go back to reference Kasiri, B., Cai, J., & Alfa, A. S. (2012). Energy-efficient key management in self-organized multi-channel cognitive radio networks. Technical report, University of Manitoba, Canada. Kasiri, B., Cai, J., & Alfa, A. S. (2012). Energy-efficient key management in self-organized multi-channel cognitive radio networks. Technical report, University of Manitoba, Canada.
31.
go back to reference Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2006). Pairings for cryptographers, IACR Cryptology ePrint Archive. Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2006). Pairings for cryptographers, IACR Cryptology ePrint Archive.
32.
go back to reference Recommendation for Key Management. (2011). Special Publication 800–57 Part 1 Rev. 3, NIST. Recommendation for Key Management. (2011). Special Publication 800–57 Part 1 Rev. 3, NIST.
33.
go back to reference Cha, J. C., & Cheon, J. H. (2003). An identity-based signature from gap Diffie–Hellman groups. Springer-Verlag Lecture Notes in Computer Science, 2567, 1830. Cha, J. C., & Cheon, J. H. (2003). An identity-based signature from gap Diffie–Hellman groups. Springer-Verlag Lecture Notes in Computer Science, 2567, 1830.
34.
go back to reference Cremers, C., Lafourcade, P., & Nadeau, P. (2009). Comparing state spaces in automatic protocol analysis (pp. 70–94). Springer Lecture Notes in Computer Science: Formal to Practical Security. Cremers, C., Lafourcade, P., & Nadeau, P. (2009). Comparing state spaces in automatic protocol analysis (pp. 70–94). Springer Lecture Notes in Computer Science: Formal to Practical Security.
35.
go back to reference Cremers, C. (2006). Scyther-Semantics and verification of security protocols. Eindhoven: Eindhoven University of technology Press. Cremers, C. (2006). Scyther-Semantics and verification of security protocols. Eindhoven: Eindhoven University of technology Press.
Metadata
Title
Securing coalitional game for distributed cooperative spectrum sensing in multi-channel cognitive radio networks
Authors
Behzad Kasiri
Jun Cai
Attahiru S. Alfa
Publication date
01-03-2015
Publisher
Springer US
Published in
Electronic Commerce Research / Issue 1/2015
Print ISSN: 1389-5753
Electronic ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-014-9158-z

Other articles of this Issue 1/2015

Electronic Commerce Research 1/2015 Go to the issue