Skip to main content
Erschienen in: Neural Computing and Applications 1/2020

05.10.2018 | Brain- Inspired computing and Machine learning for Brain Health

Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks

verfasst von: S. Vimal, L. Kalaivani, M. Kaliappan, A. Suresh, Xiao-Zhi Gao, R. Varatharajan

Erschienen in: Neural Computing and Applications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The cognitive radio network (CR) is a primary and promising technology to distribute the spectrum assignment to an unlicensed user (secondary users) which is not utilized by the licensed user (primary user).The cognitive radio network frames a reactive security policy to enhance the energy monitoring while using the CR network primary channels. The CR network has a good amount of energy capacity using battery resource and accesses the data communication via the time-slotted channel. The data communication with moderate energy-level utilization during transmission is a great challenge in CR network security monitoring, since intruders may often attack the network in reducing the energy level of the PU or SU. The framework used to secure the communication is using the discrete-time partially observed Markov decision process. This system proposes a modern data communication-secured scheme using private key encryption with the sensing results, and eclat algorithm has been proposed for energy detection and Byzantine attack prediction. The data communication is secured using the AES algorithm at the CR network, and the simulation provides the best effort-efficient energy usage and security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhao Q, Krishnamachari B, Liu K (2008) On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance. IEEE Trans Wirel Commun 7(12):5431–5440CrossRef Zhao Q, Krishnamachari B, Liu K (2008) On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance. IEEE Trans Wirel Commun 7(12):5431–5440CrossRef
2.
Zurück zum Zitat Yan M et al (2011) Game-theoretic approach against selfish attacks in cognitive radio networks. In: IEEE/ACIS 10th International conference computer and information science (ICIS) Yan M et al (2011) Game-theoretic approach against selfish attacks in cognitive radio networks. In: IEEE/ACIS 10th International conference computer and information science (ICIS)
3.
Zurück zum Zitat Cichoń K, Kliks A, Bogucka H (2016) Energy-efficient cooperative spectrum sensing: a survey. IEEE Commun Surveys Tutor 18(3):1861–1886CrossRef Cichoń K, Kliks A, Bogucka H (2016) Energy-efficient cooperative spectrum sensing: a survey. IEEE Commun Surveys Tutor 18(3):1861–1886CrossRef
4.
Zurück zum Zitat Wang HS, Moayeri N (1995) Finite-state Markov channel: a useful model for radio communication channels. IEEE Trans Veh Technol 44(1):163–171CrossRef Wang HS, Moayeri N (1995) Finite-state Markov channel: a useful model for radio communication channels. IEEE Trans Veh Technol 44(1):163–171CrossRef
5.
Zurück zum Zitat Alahmadi A, Abdelhakim M, Ren J, Li T (2013) Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. In: Global communications conference (GLOBECOM) Alahmadi A, Abdelhakim M, Ren J, Li T (2013) Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. In: Global communications conference (GLOBECOM)
6.
Zurück zum Zitat Park S, Hong D (2013) Optimal spectrum access for energy harvesting cognitive radio networks. IEEE Trans Wirel Commun 12(12):6166–6179CrossRef Park S, Hong D (2013) Optimal spectrum access for energy harvesting cognitive radio networks. IEEE Trans Wirel Commun 12(12):6166–6179CrossRef
7.
Zurück zum Zitat Elkashlan M, Wang L, Duong TQ, Karagiannidis GK, Nallanathan A (2015) On the security of cognitive radio networks. IEEE Trans Veh Technol 64(8):3790–3795CrossRef Elkashlan M, Wang L, Duong TQ, Karagiannidis GK, Nallanathan A (2015) On the security of cognitive radio networks. IEEE Trans Veh Technol 64(8):3790–3795CrossRef
8.
Zurück zum Zitat Patel K, Durvesh A (2016) Detection of multiple selfish attack nodes in cognitive radio. IJARIIE-ISSN (O)-2395-4396 2(2) Patel K, Durvesh A (2016) Detection of multiple selfish attack nodes in cognitive radio. IJARIIE-ISSN (O)-2395-4396 2(2)
11.
Zurück zum Zitat Holcomb S, Rawat DB (2016) Recent security issues on cognitive radio networks: a survey. In: Proceedings of Southeast Con, pp 1–6 Holcomb S, Rawat DB (2016) Recent security issues on cognitive radio networks: a survey. In: Proceedings of Southeast Con, pp 1–6
12.
Zurück zum Zitat Kim JM, Lee HS, Yi J, Park M (2006) Power adaptive data encryption for energy-efficient and secure communication in solar-powered wireless sensor networks. J Sens vol. 2016, Feb. 2016, Art. no. 2678269. NIST Standards (2001). Advanced Encryption Standard (AES) Kim JM, Lee HS, Yi J, Park M (2006) Power adaptive data encryption for energy-efficient and secure communication in solar-powered wireless sensor networks. J Sens vol. 2016, Feb. 2016, Art. no. 2678269. NIST Standards (2001). Advanced Encryption Standard (AES)
14.
Zurück zum Zitat Lee P, Eu ZA, Han M, Tan H-P (2011) Empirical modeling of a solar-powered energy harvesting wireless sensor node for time-slotted operation. In: Proceedings of IEEE wireless communications and networking conference, pp 179–184 Lee P, Eu ZA, Han M, Tan H-P (2011) Empirical modeling of a solar-powered energy harvesting wireless sensor node for time-slotted operation. In: Proceedings of IEEE wireless communications and networking conference, pp 179–184
15.
Zurück zum Zitat Abdullah HN, Abed HS (2016) Improvement of energy consumption in cognitive radio by reducing the number of sensed samples. In: Proceedings of Al-Sadeq international conference multidisciplinary IT communication science and applications (AIC-MITCSA), pp 1–6 Abdullah HN, Abed HS (2016) Improvement of energy consumption in cognitive radio by reducing the number of sensed samples. In: Proceedings of Al-Sadeq international conference multidisciplinary IT communication science and applications (AIC-MITCSA), pp 1–6
16.
Zurück zum Zitat Chaudhary A, Dongre M, Patil H (2016) Energy-decisive and upgrade cooperative spectrum sensing in cognitive radio networks. Procedia Comput Sci 79:683–691CrossRef Chaudhary A, Dongre M, Patil H (2016) Energy-decisive and upgrade cooperative spectrum sensing in cognitive radio networks. Procedia Comput Sci 79:683–691CrossRef
17.
Zurück zum Zitat Tang Long, Juebo Wu (2012) Research and analysis on cognitive radio network security. Wirel Sensor Netw 4:120–126CrossRef Tang Long, Juebo Wu (2012) Research and analysis on cognitive radio network security. Wirel Sensor Netw 4:120–126CrossRef
18.
Zurück zum Zitat Vullers RJM, van Schaijk R, Doms I, van Hoof C, Mertens R (2009) Micropower energy harvesting. Solid-State Electron 53(7):684–693CrossRef Vullers RJM, van Schaijk R, Doms I, van Hoof C, Mertens R (2009) Micropower energy harvesting. Solid-State Electron 53(7):684–693CrossRef
19.
Zurück zum Zitat Amiri (2010) Measurements of energy consumption and execution time of different operations on Tmote Sky sensor nodes. Ph.D. dissertation, Faculty Informatiky, Masaryk Univerzita, Brno, Czech Republic Amiri (2010) Measurements of energy consumption and execution time of different operations on Tmote Sky sensor nodes. Ph.D. dissertation, Faculty Informatiky, Masaryk Univerzita, Brno, Czech Republic
20.
Zurück zum Zitat Sen J (2013) A survey on security and privacy protocols for cognitive wireless sensor networks. J Netw Inf Secur 1:1–43 Sen J (2013) A survey on security and privacy protocols for cognitive wireless sensor networks. J Netw Inf Secur 1:1–43
21.
Zurück zum Zitat Gill RK, Chawla P, Sachdeva M. Study of LEACH routing protocol for wireless sensor networks Gill RK, Chawla P, Sachdeva M. Study of LEACH routing protocol for wireless sensor networks
23.
Zurück zum Zitat Sánchez-Salas DA, Cuevas-Ruíz JL, González-Mendoza M (2012) Wireless channel model with Markov chains using MATLAB. In: MATLAB—a fundamental tool for scientific computing and engineering applications, vol 2. Rijeka, Croatia: InTech, 2012, ch. 11 Sánchez-Salas DA, Cuevas-Ruíz JL, González-Mendoza M (2012) Wireless channel model with Markov chains using MATLAB. In: MATLAB—a fundamental tool for scientific computing and engineering applications, vol 2. Rijeka, Croatia: InTech, 2012, ch. 11
25.
Zurück zum Zitat Cao XR, Guo X (2007) Partially observable Markov decision processes with reward information: basic ideas and models. IEEE Trans Autom Control 52(4):677–681MathSciNetCrossRef Cao XR, Guo X (2007) Partially observable Markov decision processes with reward information: basic ideas and models. IEEE Trans Autom Control 52(4):677–681MathSciNetCrossRef
26.
Zurück zum Zitat Xu X, He B, Yang W, Zhou X, Cai Y (2016) Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers. IEEE Trans Inf Forensics Secur 11(2):373–387CrossRef Xu X, He B, Yang W, Zhou X, Cai Y (2016) Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers. IEEE Trans Inf Forensics Secur 11(2):373–387CrossRef
27.
Zurück zum Zitat Vimal S et al (2016) Secure data packet transmission in MANET using enhanced identity-based cryptography. Int J New Technol Sci Eng 3(12):35–42 Vimal S et al (2016) Secure data packet transmission in MANET using enhanced identity-based cryptography. Int J New Technol Sci Eng 3(12):35–42
28.
Zurück zum Zitat Fragkiadakis A, Tragos E, Askoxylakis I (2013) A survey on security threats and detection techniques in cognitive radio networks. Commun Surv Tutor IEEE 15(1):428–445CrossRef Fragkiadakis A, Tragos E, Askoxylakis I (2013) A survey on security threats and detection techniques in cognitive radio networks. Commun Surv Tutor IEEE 15(1):428–445CrossRef
29.
Zurück zum Zitat Chen R, Park J-M, Reed JH (2008) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Sel Areas Commun 26(1)CrossRef Chen R, Park J-M, Reed JH (2008) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Sel Areas Commun 26(1)CrossRef
31.
Zurück zum Zitat Bertsekas DP (2007) Dynamic programming and optimal control, vol 1. Athena Scientific, BelmontMATH Bertsekas DP (2007) Dynamic programming and optimal control, vol 1. Athena Scientific, BelmontMATH
32.
Zurück zum Zitat Thylashri S, Femi D, David SA, Suresh A (2018) Vitality and peripatetic sustain cluster key management schemes in MANET. Int J Eng Technol 7(1.7):43–46CrossRef Thylashri S, Femi D, David SA, Suresh A (2018) Vitality and peripatetic sustain cluster key management schemes in MANET. Int J Eng Technol 7(1.7):43–46CrossRef
33.
Zurück zum Zitat Lin S, Li Y, Li Y, Ai B, Zhong Z (2014) Finite-state Markov channel modeling for vehicle-to-infrastructure communications. In: Proceedings of IEEE 6th international symposium wireless vehicular communications (WiVeC), pp 1–5 Lin S, Li Y, Li Y, Ai B, Zhong Z (2014) Finite-state Markov channel modeling for vehicle-to-infrastructure communications. In: Proceedings of IEEE 6th international symposium wireless vehicular communications (WiVeC), pp 1–5
34.
Zurück zum Zitat Howa KC, Maa M, Qin Y (2012) An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors. Comput Netw 56(7):2068–2079CrossRef Howa KC, Maa M, Qin Y (2012) An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors. Comput Netw 56(7):2068–2079CrossRef
Metadaten
Titel
Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks
verfasst von
S. Vimal
L. Kalaivani
M. Kaliappan
A. Suresh
Xiao-Zhi Gao
R. Varatharajan
Publikationsdatum
05.10.2018
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 1/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-018-3788-3

Weitere Artikel der Ausgabe 1/2020

Neural Computing and Applications 1/2020 Zur Ausgabe

S.I. : Brain- Inspired computing and Machine learning for Brain Health

Research on topic discovery technology for Web news

Brain- Inspired computing and Machine learning for Brain Health

Engineering vehicle management system based on the internet of things

S.I. : Brain- Inspired computing and Machine learning for Brain Health

The attribute reduction method modeling and evaluation based on flight parameter data

Brain- Inspired computing and Machine learning for Brain Health

An approach of recursive timing deep belief network for algal bloom forecasting

Premium Partner