Skip to main content
Erschienen in: Wireless Personal Communications 3/2020

14.08.2020

Real Time Authenticated Spectrum Access and Encrypted Image Transmission via Cloud Enabled Fusion centre

verfasst von: V. M. Padmapriya, K. Thenmozhi, J. Avila, Rengarajan Amirtharajan, Padmapriya Praveenkumar

Erschienen in: Wireless Personal Communications | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Spectrum scarcity and the number of mobile users accessing the spectrum are increasing radically, as a complement to this, under utilization of the licensed spectrum also subsist day by day. Hence, in this paper, a solution has been devised to efficiently access the unused spectrum of the licensed user to eradicate the crowded spectrum shortage. A fusion center based authenticated framework has been established to accommodate licensed Primary Users (PUs) and secondary users. The licensed Primary User (PU), updates its information to the Fusion Center (FC1) and the updated information is encrypted and uploaded to the cloud environment. Subsequently, Fusion Center (FC2) communicating with the cloud environment, downloads the PU information. The authenticated secondary users connected with FC2 were given access to the spectrum based on priority and their signal conditioning. This proposed methodology also evades the Primary user emulation attack by adopting encryption algorithms. Further, Confidentiality, Integrity, and Authentication were also guaranteed while accessing the cloud framework. Various communication and security metrices were estimated to validate the proposed system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alhamad, R., & Boujemaa, H. (2020). Cooperative spectrum sensing with energy harvesting. Telecommunication Systems, 74(1), 35–43.CrossRef Alhamad, R., & Boujemaa, H. (2020). Cooperative spectrum sensing with energy harvesting. Telecommunication Systems, 74(1), 35–43.CrossRef
2.
Zurück zum Zitat Vyshnavi Jyothi, S., & Shyamala Bharathi, P. (2020). Spectrum sensing based on energy detection for cognitive radio using poission traffic. International Journal of Psychosocial Rehabilitation, 24(5), 2761–2768.CrossRef Vyshnavi Jyothi, S., & Shyamala Bharathi, P. (2020). Spectrum sensing based on energy detection for cognitive radio using poission traffic. International Journal of Psychosocial Rehabilitation, 24(5), 2761–2768.CrossRef
3.
Zurück zum Zitat Jayasri, C., & Sakthivel, G. (2020). Spectrum sensing in cognitive radio network using cuckoo search with energy heuristic. Journal of Advanced Research in Dynamical and Control Systems, 12(3 Special Issue), 339–348. Jayasri, C., & Sakthivel, G. (2020). Spectrum sensing in cognitive radio network using cuckoo search with energy heuristic. Journal of Advanced Research in Dynamical and Control Systems, 12(3 Special Issue), 339–348.
4.
Zurück zum Zitat Gul, N., Qureshi, I.M., Khan, M.S., Elahi, A., & Akbar, S. (2020). Differential evolution based reliable cooperative spectrum sensing in the presence of malicious users. Wireless Personal Communications. Gul, N., Qureshi, I.M., Khan, M.S., Elahi, A., & Akbar, S. (2020). Differential evolution based reliable cooperative spectrum sensing in the presence of malicious users. Wireless Personal Communications.
5.
Zurück zum Zitat Paul, A., Kunarapu, P., Banerjee, A., & Maity, S. P. (2019). Spectrum sensing in cognitive vehicular networks for uniform mobility model. IET Communications, 13(19), 3127–3134.CrossRef Paul, A., Kunarapu, P., Banerjee, A., & Maity, S. P. (2019). Spectrum sensing in cognitive vehicular networks for uniform mobility model. IET Communications, 13(19), 3127–3134.CrossRef
6.
Zurück zum Zitat Li, X., & Zhu, Q. (2019). Game based incentive mechanism for cooperative spectrum sensing with mobile crowd sensors. Wireless Networks, 25(4), 1855–1866.MathSciNetCrossRef Li, X., & Zhu, Q. (2019). Game based incentive mechanism for cooperative spectrum sensing with mobile crowd sensors. Wireless Networks, 25(4), 1855–1866.MathSciNetCrossRef
7.
Zurück zum Zitat Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens—A tri-layer cryptic solution. Computers in Biology and Medicine, 62, 264–276.CrossRef Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens—A tri-layer cryptic solution. Computers in Biology and Medicine, 62, 264–276.CrossRef
8.
Zurück zum Zitat Ravichandran, D., Praveenkumar, P., Balaguru Rayappan, J. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170–184.CrossRef Ravichandran, D., Praveenkumar, P., Balaguru Rayappan, J. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170–184.CrossRef
9.
Zurück zum Zitat Ravichandran, D., Praveenkumar, P., Rayappan, J. B. B., & Amirtharajan, R. (2017). DNA chaos blend to secure medical privacy. IEEE Transactions on Nanobioscience, 16, 850–858.CrossRef Ravichandran, D., Praveenkumar, P., Rayappan, J. B. B., & Amirtharajan, R. (2017). DNA chaos blend to secure medical privacy. IEEE Transactions on Nanobioscience, 16, 850–858.CrossRef
10.
Zurück zum Zitat Fu, C., Zhang, G., Bian, O., Lei, W., & Ma, H. (2014). A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One, 9(12), e115773.CrossRef Fu, C., Zhang, G., Bian, O., Lei, W., & Ma, H. (2014). A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One, 9(12), e115773.CrossRef
11.
Zurück zum Zitat Zhang, S., Gao, T., & Gao, L. (2014). A novel encryption frame for medical image with watermark based on hyperchaotic system. Mathematical Problems in Engineering 1–11. Zhang, S., Gao, T., & Gao, L. (2014). A novel encryption frame for medical image with watermark based on hyperchaotic system. Mathematical Problems in Engineering 1–11.
12.
Zurück zum Zitat Fu, C., Meng, W., Zhan, Y., Zhu, Z., Lau, F. C. M., Tse, C. K., et al. (2013). An efficient and secure medical image protection scheme based on chaotic maps. Computers in Biology and Medicine, 43(8), 1000–1010.CrossRef Fu, C., Meng, W., Zhan, Y., Zhu, Z., Lau, F. C. M., Tse, C. K., et al. (2013). An efficient and secure medical image protection scheme based on chaotic maps. Computers in Biology and Medicine, 43(8), 1000–1010.CrossRef
13.
Zurück zum Zitat Li, X., Wang, L., Yan, Y., & Liu, P. (2016). An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems. Optik - International Journal for Light and Electron Optics, 127(5), 2558–2565.CrossRef Li, X., Wang, L., Yan, Y., & Liu, P. (2016). An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems. Optik - International Journal for Light and Electron Optics, 127(5), 2558–2565.CrossRef
14.
Zurück zum Zitat Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., et al. (2017). Fusion of confusion and diffusion: a novel image encryption approach. Telecommunication Systems, 65, 65–78.CrossRef Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., et al. (2017). Fusion of confusion and diffusion: a novel image encryption approach. Telecommunication Systems, 65, 65–78.CrossRef
15.
Zurück zum Zitat Manimegalai, M., & Bhagyaveni, M. A. (2019). A method to enhance the throughput of cognitive radio network using Kullback Leibler divergence with optimised sensing time (KLDOST). Wireless Personal Communications, 109(3), 1645–1660.CrossRef Manimegalai, M., & Bhagyaveni, M. A. (2019). A method to enhance the throughput of cognitive radio network using Kullback Leibler divergence with optimised sensing time (KLDOST). Wireless Personal Communications, 109(3), 1645–1660.CrossRef
16.
Zurück zum Zitat Revathy, K., Thenmozhi, K., Amirtharajan, R., & Praveenkumar, P. (2018). CR assisted IE guarded authenticated biomedical image transactions. IEEE Photonics Journal, 10(5), 1–13.CrossRef Revathy, K., Thenmozhi, K., Amirtharajan, R., & Praveenkumar, P. (2018). CR assisted IE guarded authenticated biomedical image transactions. IEEE Photonics Journal, 10(5), 1–13.CrossRef
17.
Zurück zum Zitat Praveenkumar, P., Catherine Priya, P., Avila, J., et al. (2017). Tamper proofing identification and authenticated DICOM image transmission using wireless channels and CR network. Wireless Personal Communications, 97(4), 5573–5595.CrossRef Praveenkumar, P., Catherine Priya, P., Avila, J., et al. (2017). Tamper proofing identification and authenticated DICOM image transmission using wireless channels and CR network. Wireless Personal Communications, 97(4), 5573–5595.CrossRef
18.
Zurück zum Zitat Subbulakshmi, P., Prakash, M., & Ramalakshmi, V. (2018). Honest auction based spectrum assignment and exploiting spectrum sensing data falsification attack using stochastic game theory in wireless cognitive radio network. Wireless Personal Communications, 102(2), 799–816.CrossRef Subbulakshmi, P., Prakash, M., & Ramalakshmi, V. (2018). Honest auction based spectrum assignment and exploiting spectrum sensing data falsification attack using stochastic game theory in wireless cognitive radio network. Wireless Personal Communications, 102(2), 799–816.CrossRef
19.
Zurück zum Zitat Na, W., Yoon, J., Cho, S., Griffith, D., & Golmie, N. (2018). Centralized cooperative directional spectrum sensing for cognitive radio networks. IEEE Transactions on Mobile Computing, 17(6), 1260–1274.CrossRef Na, W., Yoon, J., Cho, S., Griffith, D., & Golmie, N. (2018). Centralized cooperative directional spectrum sensing for cognitive radio networks. IEEE Transactions on Mobile Computing, 17(6), 1260–1274.CrossRef
20.
Zurück zum Zitat Alhamad, R., Wang, H., & Yao, Y.-D. (2017). Cooperative spectrum sensing with random access reporting channels in cognitive radio networks. IEEE Transactions on Vehicular Technology, 66(8), 7249–7261.CrossRef Alhamad, R., Wang, H., & Yao, Y.-D. (2017). Cooperative spectrum sensing with random access reporting channels in cognitive radio networks. IEEE Transactions on Vehicular Technology, 66(8), 7249–7261.CrossRef
21.
Zurück zum Zitat Khanikar, K., Sinha, R., & Bhattacharjee, R. (2017). Incorporating primary user interference for enhanced spectrum sensing. IEEE Signal Processing Letters, 24(7), 1039–1043.CrossRef Khanikar, K., Sinha, R., & Bhattacharjee, R. (2017). Incorporating primary user interference for enhanced spectrum sensing. IEEE Signal Processing Letters, 24(7), 1039–1043.CrossRef
22.
Zurück zum Zitat Deepthi, P. P., & Sathidevi, P. S. (2009). Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. Computers & Security, 28(3–4), 229–241.CrossRef Deepthi, P. P., & Sathidevi, P. S. (2009). Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. Computers & Security, 28(3–4), 229–241.CrossRef
23.
Zurück zum Zitat Yang, Y., Chen, F., Zhang, X., Yu, J., & Zhang, P. (2017). Research on the hash function structures and its application. Wireless Personal Communications, 94(4), 2969–2985.CrossRef Yang, Y., Chen, F., Zhang, X., Yu, J., & Zhang, P. (2017). Research on the hash function structures and its application. Wireless Personal Communications, 94(4), 2969–2985.CrossRef
24.
Zurück zum Zitat Zhang, P., Zhang, X., & Yu, J. (2017). A parallel hash function with variable initial values. Wireless Personal Communications, 96(2), 2289–2303.CrossRef Zhang, P., Zhang, X., & Yu, J. (2017). A parallel hash function with variable initial values. Wireless Personal Communications, 96(2), 2289–2303.CrossRef
25.
Zurück zum Zitat Senthil Kumar, R., & Geetha, B. G. (2018). Signature verification and bloom hashing technique for efficient cloud data storage. Wireless Personal Communications, 103(4), 3079–3097.CrossRef Senthil Kumar, R., & Geetha, B. G. (2018). Signature verification and bloom hashing technique for efficient cloud data storage. Wireless Personal Communications, 103(4), 3079–3097.CrossRef
26.
Zurück zum Zitat Hamza, R., Muhammad, K., Kumar, A., & Ramirez-Gonzalez, G. (2017). Hash based encryption for key frames of diagnostic hysteroscopy. IEEE Access, 6, 60160–60170.CrossRef Hamza, R., Muhammad, K., Kumar, A., & Ramirez-Gonzalez, G. (2017). Hash based encryption for key frames of diagnostic hysteroscopy. IEEE Access, 6, 60160–60170.CrossRef
Metadaten
Titel
Real Time Authenticated Spectrum Access and Encrypted Image Transmission via Cloud Enabled Fusion centre
verfasst von
V. M. Padmapriya
K. Thenmozhi
J. Avila
Rengarajan Amirtharajan
Padmapriya Praveenkumar
Publikationsdatum
14.08.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07674-8

Weitere Artikel der Ausgabe 3/2020

Wireless Personal Communications 3/2020 Zur Ausgabe

Neuer Inhalt