Skip to main content
Erschienen in: Electronic Commerce Research 1/2015

01.03.2015

Securing coalitional game for distributed cooperative spectrum sensing in multi-channel cognitive radio networks

verfasst von: Behzad Kasiri, Jun Cai, Attahiru S. Alfa

Erschienen in: Electronic Commerce Research | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, a secure scheme is purposed for coalitional game in multi-channel cognitive radio networks. First, a distributed cooperative attack on multi-channel cooperative spectrum sensing is proposed. In the proposed attack, attackers play two coalitional games to maximize the number of invaded channels in a distributed manner. In the first game, attackers play with their fellow ones to allocate an optimal number of attackers for each channel, while in the second game, they play in the coalitions with other honest cognitive radios so as to conquer as many channels as possible. Then, a hierarchical ID-based key management scheme is proposed, where cognitive radios can only play on a certain number of requested channels and channel access for sensing is limited to the honest cognitive radios selected in the coalitional game. Simulation results show that the proposed attack can considerably decrease the number of potential channels with a low attack cost when security scheme is not considered, in addition to the energy efficiency of the proposed key management scheme. Finally, formal verification of the proposed key management scheme guarantees its immunity and effectiveness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Federal Communications Commission. (2002). Spectrum policy task force report, FCC 02–155. Federal Communications Commission. (2002). Spectrum policy task force report, FCC 02–155.
2.
Zurück zum Zitat Zhao, Q., & Sadler, B. M. (2007). A survey of dynamic spectrum access: Signal processing, networking, and regulatory policy. IEEE Signal Processing Magazine, 24, 79–89.CrossRef Zhao, Q., & Sadler, B. M. (2007). A survey of dynamic spectrum access: Signal processing, networking, and regulatory policy. IEEE Signal Processing Magazine, 24, 79–89.CrossRef
3.
Zurück zum Zitat Cabric, D., & Brodersen, S. W. (2005). Implementation issues in spectrum sensing for cognitive radios. The 38th Asilomar Conference on Signals, Systems, and Computers, (pp. 124–130), Pacific Grove, CA, USA. Cabric, D., & Brodersen, S. W. (2005). Implementation issues in spectrum sensing for cognitive radios. The 38th Asilomar Conference on Signals, Systems, and Computers, (pp. 124–130), Pacific Grove, CA, USA.
4.
Zurück zum Zitat Urkowitz, H. (1967). Energy detection of unknown deterministic signals. Proceedings of IEEE, 55, 523–231.CrossRef Urkowitz, H. (1967). Energy detection of unknown deterministic signals. Proceedings of IEEE, 55, 523–231.CrossRef
5.
Zurück zum Zitat Zhang, W., & Letaief, K. (2008). Cooperative spectrum sensing with transmit and relay diversity in cognitive networks. IEEE Transactions on Wireless Communications, 7, 4761–4766.CrossRef Zhang, W., & Letaief, K. (2008). Cooperative spectrum sensing with transmit and relay diversity in cognitive networks. IEEE Transactions on Wireless Communications, 7, 4761–4766.CrossRef
6.
Zurück zum Zitat Wang, W., Kasiri, B., Cai, J., & Alfa, A.S. (2010). Distributed cooperative multi-channel spectrum sensing based on a dynamic coalitional game. IEEE Global Communications Conference (GLOBECOM’10), (pp. 589–600), Miami, FL, USA. Wang, W., Kasiri, B., Cai, J., & Alfa, A.S. (2010). Distributed cooperative multi-channel spectrum sensing based on a dynamic coalitional game. IEEE Global Communications Conference (GLOBECOM’10), (pp. 589–600), Miami, FL, USA.
7.
Zurück zum Zitat Isaac, J. T., Zeadally, S., & Camara, J. S. (2012). A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs). Electronic Commerce Research, Springer, 12(1), 97–123. Isaac, J. T., Zeadally, S., & Camara, J. S. (2012). A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs). Electronic Commerce Research, Springer, 12(1), 97–123.
8.
Zurück zum Zitat Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: A trust model. Electronic Commerce Research, Springer, 4(4), 359–372. Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: A trust model. Electronic Commerce Research, Springer, 4(4), 359–372.
9.
Zurück zum Zitat Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. IEEE Int’l Conf. on Computer Commun. (INFOCOM’08), (pp. 1876–1884), Phoenix, AZ, USA. Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. IEEE Int’l Conf. on Computer Commun. (INFOCOM’08), (pp. 1876–1884), Phoenix, AZ, USA.
10.
Zurück zum Zitat Rawat, A.S., Anand, P., Hao, C., & Varshney, P.K. (2010). Countering byzantine attacks in cognitive radio networks. 2010 IEEE Int’l Conference on Acoustics Speech and Signal Processing (ICASSP’10), (pp. 3098–3101), Dallas, TX, USA. Rawat, A.S., Anand, P., Hao, C., & Varshney, P.K. (2010). Countering byzantine attacks in cognitive radio networks. 2010 IEEE Int’l Conference on Acoustics Speech and Signal Processing (ICASSP’10), (pp. 3098–3101), Dallas, TX, USA.
11.
Zurück zum Zitat Rawat, A. S., Anand, P., Hao, C., & Varshney, P. K. (2011). Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Transactions on Signal Processing, 59(2), 774–786.CrossRef Rawat, A. S., Anand, P., Hao, C., & Varshney, P. K. (2011). Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Transactions on Signal Processing, 59(2), 774–786.CrossRef
12.
Zurück zum Zitat He, X., Dai, H., & Ning, P. (2012). A byzantine attack defender: The conditional frequency check. IEEE Int’l Symposium on Information Theory (ISIT’12), (pp. 975–979), Boston, MA, USA. He, X., Dai, H., & Ning, P. (2012). A byzantine attack defender: The conditional frequency check. IEEE Int’l Symposium on Information Theory (ISIT’12), (pp. 975–979), Boston, MA, USA.
13.
Zurück zum Zitat Du, R., Foo, E., & Boyd, C. (2008). Designing a secure e-tender submission protocol. Electronic Commerce Research, Springer, 8(3), 115–142. Du, R., Foo, E., & Boyd, C. (2008). Designing a secure e-tender submission protocol. Electronic Commerce Research, Springer, 8(3), 115–142.
14.
Zurück zum Zitat Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Springer Lecture Notes in Computer Science, 196, 4753. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Springer Lecture Notes in Computer Science, 196, 4753.
15.
Zurück zum Zitat Tan, Z. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, Springer, 12(4), 505–518. Tan, Z. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, Springer, 12(4), 505–518.
16.
Zurück zum Zitat Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612.CrossRef Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612.CrossRef
17.
Zurück zum Zitat Tan, E. C., Leong, P. C., & Sio, L. T. (2008). Group-access control of confidential files in e-commerce management using shared-secret scheme. Electronic Commerce Research, Springer, 2(1–2), 151–158. Tan, E. C., Leong, P. C., & Sio, L. T. (2008). Group-access control of confidential files in e-commerce management using shared-secret scheme. Electronic Commerce Research, Springer, 2(1–2), 151–158.
19.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity based encryption from the Weil pairing. Springer Lecture Notes in Computer Science, 2139, 213229. Boneh, D., & Franklin, M. (2001). Identity based encryption from the Weil pairing. Springer Lecture Notes in Computer Science, 2139, 213229.
20.
Zurück zum Zitat Zhao, Q., Tong, L., Swami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework. IEEE JSAC, 25(3), 589–600. Zhao, Q., Tong, L., Swami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework. IEEE JSAC, 25(3), 589–600.
21.
Zurück zum Zitat Ghasemi, A., & Sousa, E. (2005). Collaborative spectrum sensing for opportunistic access in fading environments. IEEE DySPAN’05, Baltimore, MD, USA. Ghasemi, A., & Sousa, E. (2005). Collaborative spectrum sensing for opportunistic access in fading environments. IEEE DySPAN’05, Baltimore, MD, USA.
22.
Zurück zum Zitat Ahmed, S., Hossain, M. S., Abdullah, M., & Hossain, M. A. (2012). Cooperative spectrum sensing over Rayleigh fading channel in cognitive radio. International Journal of Electronics and Computer Science Engineering, 1(4), 2583–2592. Ahmed, S., Hossain, M. S., Abdullah, M., & Hossain, M. A. (2012). Cooperative spectrum sensing over Rayleigh fading channel in cognitive radio. International Journal of Electronics and Computer Science Engineering, 1(4), 2583–2592.
23.
Zurück zum Zitat Ghasemi, A., & Sousa, (2007). Opportunistic spectrum access in fading channels through collaborative sensing. Journal of Communications, 2(2), 71–82.CrossRef Ghasemi, A., & Sousa, (2007). Opportunistic spectrum access in fading channels through collaborative sensing. Journal of Communications, 2(2), 71–82.CrossRef
24.
Zurück zum Zitat Shen, J., Liu, S., Zeng, L., Xie, G., Gao, J., & Liu, Y. (2009). Optimization of cooperative spectrum sensing in cognitive radio network. IET Communications, 3(7), 1170–1178.CrossRef Shen, J., Liu, S., Zeng, L., Xie, G., Gao, J., & Liu, Y. (2009). Optimization of cooperative spectrum sensing in cognitive radio network. IET Communications, 3(7), 1170–1178.CrossRef
25.
Zurück zum Zitat Isheden, C., & Fettweis, G. P. (2010). Energy-efficient multi-carrier link adaptation with sum rate-dependent circuit power. IEEE Global Telecommunications Conference (GLOBECOM’10), (pp. 1–6), Miami, FL, USA. Isheden, C., & Fettweis, G. P. (2010). Energy-efficient multi-carrier link adaptation with sum rate-dependent circuit power. IEEE Global Telecommunications Conference (GLOBECOM’10), (pp. 1–6), Miami, FL, USA.
26.
Zurück zum Zitat Bloem, M., Alpcan, T. & Basar, T. (2007). A Stackelberg game for power control and channel allocation in cognitive radio networks. Int’l ICST Workshop on Game Theory in Communication Networks (GameComm’07), France. Bloem, M., Alpcan, T. & Basar, T. (2007). A Stackelberg game for power control and channel allocation in cognitive radio networks. Int’l ICST Workshop on Game Theory in Communication Networks (GameComm’07), France.
27.
Zurück zum Zitat Myerson, R. (1991). Game theory, analysis and conflict. Cambridge, MA: Harvard University Press. Myerson, R. (1991). Game theory, analysis and conflict. Cambridge, MA: Harvard University Press.
28.
Zurück zum Zitat Apt, G. P., & Witzel, A. (2006). A generic approach to coalition formation. Proceedings of COMSOC’06, Amsterdam, the Netherlands. Apt, G. P., & Witzel, A. (2006). A generic approach to coalition formation. Proceedings of COMSOC’06, Amsterdam, the Netherlands.
29.
Zurück zum Zitat Boyd, S., & Vandenberghe, L. (2004). Convex optimization. New York: Cambridge University Press.CrossRef Boyd, S., & Vandenberghe, L. (2004). Convex optimization. New York: Cambridge University Press.CrossRef
30.
Zurück zum Zitat Kasiri, B., Cai, J., & Alfa, A. S. (2012). Energy-efficient key management in self-organized multi-channel cognitive radio networks. Technical report, University of Manitoba, Canada. Kasiri, B., Cai, J., & Alfa, A. S. (2012). Energy-efficient key management in self-organized multi-channel cognitive radio networks. Technical report, University of Manitoba, Canada.
31.
Zurück zum Zitat Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2006). Pairings for cryptographers, IACR Cryptology ePrint Archive. Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2006). Pairings for cryptographers, IACR Cryptology ePrint Archive.
32.
Zurück zum Zitat Recommendation for Key Management. (2011). Special Publication 800–57 Part 1 Rev. 3, NIST. Recommendation for Key Management. (2011). Special Publication 800–57 Part 1 Rev. 3, NIST.
33.
Zurück zum Zitat Cha, J. C., & Cheon, J. H. (2003). An identity-based signature from gap Diffie–Hellman groups. Springer-Verlag Lecture Notes in Computer Science, 2567, 1830. Cha, J. C., & Cheon, J. H. (2003). An identity-based signature from gap Diffie–Hellman groups. Springer-Verlag Lecture Notes in Computer Science, 2567, 1830.
34.
Zurück zum Zitat Cremers, C., Lafourcade, P., & Nadeau, P. (2009). Comparing state spaces in automatic protocol analysis (pp. 70–94). Springer Lecture Notes in Computer Science: Formal to Practical Security. Cremers, C., Lafourcade, P., & Nadeau, P. (2009). Comparing state spaces in automatic protocol analysis (pp. 70–94). Springer Lecture Notes in Computer Science: Formal to Practical Security.
35.
Zurück zum Zitat Cremers, C. (2006). Scyther-Semantics and verification of security protocols. Eindhoven: Eindhoven University of technology Press. Cremers, C. (2006). Scyther-Semantics and verification of security protocols. Eindhoven: Eindhoven University of technology Press.
Metadaten
Titel
Securing coalitional game for distributed cooperative spectrum sensing in multi-channel cognitive radio networks
verfasst von
Behzad Kasiri
Jun Cai
Attahiru S. Alfa
Publikationsdatum
01.03.2015
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 1/2015
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-014-9158-z

Weitere Artikel der Ausgabe 1/2015

Electronic Commerce Research 1/2015 Zur Ausgabe