Skip to main content
Erschienen in: Wireless Personal Communications 2/2018

15.12.2017

Honest Auction Based Spectrum Assignment and Exploiting Spectrum Sensing Data Falsification Attack Using Stochastic Game Theory in Wireless Cognitive Radio Network

verfasst von: P. Subbulakshmi, M. Prakash, V. Ramalakshmi

Erschienen in: Wireless Personal Communications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cognitive radio networks being a widespread disruptive technology where idle spectrum are being analysed and made available to the unlicensed secondary users (SU) from licensed primary users (PU). During this battle of allocation of spectrum to the SU, the attackers can masquerade the network and disrupt the channels. The vulnerability attacks are more often happened based on the nature of usage of the spectrum in PU and they collect those information from secondary agent cluster, one among them is the Spectrum Sensing data falsification attack. In heterogeneous network, the vulnerabilities affect the utility of the channel and changes the information in fusion centre, where the sensing reports are might be corrupted during transmission. The paper focus on assigning the idle spectrum to be allocated based on binary stage honest based winner determination using greedy approach and the broadcasted information is secured using two phase cryptography. Besides, a rational player approach has been proposed to make the network to be susceptible to the idle environment using stochastic game modeling to prevent the attack, where a optimal solution is being estimated with nash equilibrium to identify the best response for the user to exploit the attack. The proposed mechanism is much more significantly improved duly compared with traditional mechanism and it highly improves the network performance in monitoring the induced attack and allocating the spectrum with error free transmission.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Yang, D., Fang, X., & Xue, G. (2011a). Truthful auction for cooperative communications. In MobiHoc, ACM (p. 9). Yang, D., Fang, X., & Xue, G. (2011a). Truthful auction for cooperative communications. In MobiHoc, ACM (p. 9).
4.
Zurück zum Zitat Shi, Y., Sharma, S., Hou, Y. T., et al. (2008). Optimal relay assignment for cooperative communications. In MobiHoc, ACM (pp. 3–12). Shi, Y., Sharma, S., Hou, Y. T., et al. (2008). Optimal relay assignment for cooperative communications. In MobiHoc, ACM (pp. 3–12).
5.
Zurück zum Zitat Dabcevic, K., Betancourt, A., Marcenaro, L., & Regazzoni, C. S. (2014). Intelligent cognitive radio jamming-a game-theoretical approach. EURASIP Journal on Advances in Signal Processing, 2014, 1–18.CrossRef Dabcevic, K., Betancourt, A., Marcenaro, L., & Regazzoni, C. S. (2014). Intelligent cognitive radio jamming-a game-theoretical approach. EURASIP Journal on Advances in Signal Processing, 2014, 1–18.CrossRef
6.
Zurück zum Zitat Wang, W., Bhattacharjee, S., Chatterjee, M., & Kwiat, K. (2013). Collaborative jamming and collaborative defense in cognitive radio networks. Pervasive and Mobile Computing, 9(4), 572–587.CrossRef Wang, W., Bhattacharjee, S., Chatterjee, M., & Kwiat, K. (2013). Collaborative jamming and collaborative defense in cognitive radio networks. Pervasive and Mobile Computing, 9(4), 572–587.CrossRef
7.
Zurück zum Zitat Aliu, O. G., Imran, A., Imran, M. A., et al. (2013). A survey of self organisation in future cellular networks. IEEE Communications Surveys and Tutorials, 15(1), 336–361.CrossRef Aliu, O. G., Imran, A., Imran, M. A., et al. (2013). A survey of self organisation in future cellular networks. IEEE Communications Surveys and Tutorials, 15(1), 336–361.CrossRef
8.
Zurück zum Zitat Wu, Y., Wang, B., Liu, K. R., & Clancy, T. C. (2012). Anti-jamming games in multi-channel cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(1), 4–15.CrossRef Wu, Y., Wang, B., Liu, K. R., & Clancy, T. C. (2012). Anti-jamming games in multi-channel cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(1), 4–15.CrossRef
9.
Zurück zum Zitat Tragos, E. Z., Zeadally, S., Fragkiadakis, A. G., & Siris, V. A. (2013). Spectrum assignment in cognitive radio networks: A comprehensive survey. IEEE Communications Surveys and Tutorials, 15(3), 1108–1135.CrossRef Tragos, E. Z., Zeadally, S., Fragkiadakis, A. G., & Siris, V. A. (2013). Spectrum assignment in cognitive radio networks: A comprehensive survey. IEEE Communications Surveys and Tutorials, 15(3), 1108–1135.CrossRef
12.
Zurück zum Zitat Alahmadi, A., Abdelhakim, M., Ren, J., & Li, T. (2014). Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Transactions on Information Forensics and Security, 9(5), 772–781.CrossRef Alahmadi, A., Abdelhakim, M., Ren, J., & Li, T. (2014). Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard. IEEE Transactions on Information Forensics and Security, 9(5), 772–781.CrossRef
13.
Zurück zum Zitat Sun, W., & Zhu, Y. (2015). An efficient distributed algorithm for spectrum allocation in multi-hop cognitive radio networks. In International Symposium on Quality of Service (IWQoS), IEEE (pp. 59–60). Sun, W., & Zhu, Y. (2015). An efficient distributed algorithm for spectrum allocation in multi-hop cognitive radio networks. In International Symposium on Quality of Service (IWQoS), IEEE (pp. 59–60).
14.
Zurück zum Zitat Hesham, L., Sultan, A., Nafie, M., & Digham, F. (2012). Distributed spectrum sensing with sequential ordered transmissions to a cognitive fusion center. IEEE Transactions on Signal Processing, 60(5), 2524–2538.MathSciNetCrossRefMATH Hesham, L., Sultan, A., Nafie, M., & Digham, F. (2012). Distributed spectrum sensing with sequential ordered transmissions to a cognitive fusion center. IEEE Transactions on Signal Processing, 60(5), 2524–2538.MathSciNetCrossRefMATH
15.
Zurück zum Zitat Yu, F., Tang, H., Huang, M., Li, Zh., & Mason, P. C. (2009). Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. IEEE Military Communications Conference MILCOM, Boston, USA (pp. 1–7). Yu, F., Tang, H., Huang, M., Li, Zh., & Mason, P. C. (2009). Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. IEEE Military Communications Conference MILCOM, Boston, USA (pp. 1–7).
16.
Zurück zum Zitat Dabcevic, K., Betancourt, A., Marcenaro, L., & Regazzoni, C. S. (2014). Intelligent cognitive radio jamming-a game-theoretical approach. EURASIP Journal on Advances in Signal Processing, 1, 1–18. Dabcevic, K., Betancourt, A., Marcenaro, L., & Regazzoni, C. S. (2014). Intelligent cognitive radio jamming-a game-theoretical approach. EURASIP Journal on Advances in Signal Processing, 1, 1–18.
17.
Zurück zum Zitat Yu, R., Zhang, Y., Liu, Y., Gjessing, S., & Guizani, M. (2015). Securing cognitive radio networks against primary user emulation attacks. IEEE Network, 29(4), 68–74.CrossRef Yu, R., Zhang, Y., Liu, Y., Gjessing, S., & Guizani, M. (2015). Securing cognitive radio networks against primary user emulation attacks. IEEE Network, 29(4), 68–74.CrossRef
19.
Zurück zum Zitat Subbulakshmi, P., et al. (2017). A multilevel stackelberg game theoretic approach for enhancing secrecy. In Cognitive radio networks, international conference on advanced information and communication technology (ICAIC’17) (pp. 23–28). Subbulakshmi, P., et al. (2017). A multilevel stackelberg game theoretic approach for enhancing secrecy. In Cognitive radio networks, international conference on advanced information and communication technology (ICAIC’17) (pp. 23–28).
20.
Zurück zum Zitat Sengupta, S., Brahma, S., Chatterjee, M., & Shankar, N. S. (2013). Self-coexistence among interference-aware IEEE 802.22 networks with enhanced air-interface. Pervasive and Mobile Computing, 9(4), 454–471.CrossRef Sengupta, S., Brahma, S., Chatterjee, M., & Shankar, N. S. (2013). Self-coexistence among interference-aware IEEE 802.22 networks with enhanced air-interface. Pervasive and Mobile Computing, 9(4), 454–471.CrossRef
21.
Zurück zum Zitat Brown, T. X., & Sethi, A. (2007). Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: A multi-dimensional analysis and assessment. In Cognitive radio oriented wireless networks and communications (CrownCom) (pp. 456–464). http://doi.org/10.1109/CROWNCOM.2007.4549841. Brown, T. X., & Sethi, A. (2007). Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: A multi-dimensional analysis and assessment. In Cognitive radio oriented wireless networks and communications (CrownCom) (pp. 456–464). http://​doi.​org/​10.​1109/​CROWNCOM.​2007.​4549841.
25.
Zurück zum Zitat Andersson, A., Tenhunen, M., & Ygge, F. (2000). Integer programming for combinatorial auction winner determination. In Proceedings of fourth international conference on multi-agent systems (pp. 39–46). Andersson, A., Tenhunen, M., & Ygge, F. (2000). Integer programming for combinatorial auction winner determination. In Proceedings of fourth international conference on multi-agent systems (pp. 39–46).
27.
Zurück zum Zitat Huang, H., Sun, Y., Li, X. Y., et al. (2015). Truthful auction mechanisms with performance guarantee in secondary spectrum markets. IEEE Transactions on Mobile Computing, 14(6), 1315–1329.CrossRef Huang, H., Sun, Y., Li, X. Y., et al. (2015). Truthful auction mechanisms with performance guarantee in secondary spectrum markets. IEEE Transactions on Mobile Computing, 14(6), 1315–1329.CrossRef
29.
Zurück zum Zitat Zou, J., Wu, Q., Xiong, H., et al. (2015). Dynamic spectrum access and power allocation for cooperative cognitive radio networks. IEEE Transactions on Signal Processing, 63(21), 5637–5649.MathSciNetCrossRefMATH Zou, J., Wu, Q., Xiong, H., et al. (2015). Dynamic spectrum access and power allocation for cooperative cognitive radio networks. IEEE Transactions on Signal Processing, 63(21), 5637–5649.MathSciNetCrossRefMATH
33.
Zurück zum Zitat Subbulakshmi, P., & Vimal, S. (2016). Secure data packet transmission in manet using enhanced identity-based cryptography (EIBC). International Journal of New Technologies in Science and Engineering, 3(12), 35–42. Subbulakshmi, P., & Vimal, S. (2016). Secure data packet transmission in manet using enhanced identity-based cryptography (EIBC). International Journal of New Technologies in Science and Engineering, 3(12), 35–42.
Metadaten
Titel
Honest Auction Based Spectrum Assignment and Exploiting Spectrum Sensing Data Falsification Attack Using Stochastic Game Theory in Wireless Cognitive Radio Network
verfasst von
P. Subbulakshmi
M. Prakash
V. Ramalakshmi
Publikationsdatum
15.12.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-5105-3

Weitere Artikel der Ausgabe 2/2018

Wireless Personal Communications 2/2018 Zur Ausgabe

Neuer Inhalt