| |
Security management based on trust determination in cognitive radio networks
- 作者:Jianwu Li (3) (3)
Zebing Feng (3) Zhiqing Wei (3) Zhiyong Feng (3) Ping Zhang (3) (3)
3. Network information processing center ; State Key Laboratory of switching technology and network ; Beijing University of Posts and Telecommunications ; Xitucheng Road No.10 ; Beijing ; 100876 ; China
- 关键词:Security ; CRNs ; Honest users ; Misbehaving users ; Trust value ; Punishment
- 刊名:EURASIP Journal on Advances in Signal Processing
- 出版年:2014
- 出版时间:December 2014
- 年:2014
- 卷:2014
- 期:1
- 全文大小:563 KB
- 参考文献:1. Spectrum Efficiency Working Group: Spectrum policy task force report, Federal Communications Commission. http://www.fcc.gov/sptf/files/SEWGFinalReport_1.pdf (2002)
2. Zhang, P (2012) In the development of wireless cognitive science. Chin. Sci. Bull 57: pp. 3661-3661 10.1007/s11434-012-9909-y" target="_blank" title="It opens in new window">CrossRef 3. Chen, R, Park, JM, Reed, J (2008) Defense against primary user emulation attacks in cognitive radio networks. IEEE J. Selected Areas Commun 26: pp. 25-37 10.1109/JSAC.2008.080104" target="_blank" title="It opens in new window">CrossRef 4. Fragkiadakis, AG, Tragos, EZ, Askoxylakis, IG (2013) A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surv. Tutorials 15: pp. 428-445 10.1109/SURV.2011.122211.00162" target="_blank" title="It opens in new window">CrossRef 5. Jin, Z, Subbalakshmi, KP (2009) Detecting primary user emulation attacks in dynamic spectrum access networks. Proc. ICC. pp. 1-5 6. Tan, Y, Sengupta, S, Subbalakshmi, KP (2012) Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach. IET Commun 6: pp. 964-973 10.1049/iet-com.2010.0573" target="_blank" title="It opens in new window">CrossRef 7. Tan, Y, Sengupta, S, Subbalakshmi, KP (2011) Analysis of coordinated denial-of-service attacks in IEEE 802.22 networks. IEEE J. Selected Areas Commun 29: pp. 890-902 10.1109/JSAC.2011.110419" target="_blank" title="It opens in new window">CrossRef 8. Sengupta, S, Subbalakshmi, KP (2013) Open research issues in multi-hop cognitive radio networks. IEEE Commun. Mag 51: pp. 168-176 10.1109/MCOM.2013.6495776" target="_blank" title="It opens in new window">CrossRef 9. Chen, R, Park, JM, Hou, T, Reed, J (2008) Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Commun. Mag 46: pp. 50-55 10.1109/MCOM.2008.4481340" target="_blank" title="It opens in new window">CrossRef 10. Zhu, F, Seo, S (2009) Enhanced robust cooperative spectrum sensing in cognitive radio. J. Commun. Netw 11: pp. 122-133 10.1109/JCN.2009.6391387" target="_blank" title="It opens in new window">CrossRef 11. Yu, F, Huang, M, Li, Z, Mason, P (2009) Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. Proc. Milcom. pp. 1-7 12. Wu, Q, Ding, G, Wang, J, Yao, Y (2013) Spatial-temporal opportunity detection for spectrum-heterogeneous cognitive radio networks: two-dimensional sensing. IEEE Trans. Wireless Commun 12: pp. 516-526 10.1109/TWC.2012.122212.111638" target="_blank" title="It opens in new window">CrossRef 13. Wang, J, Yao, J, Wu, Q (2013) Stealthy-attacker detection with a multidimensional feature vector for collaborative spectrum sensing. IEEE Trans. Vehicular Technol 62: pp. 3996-4009 10.1109/TVT.2013.2262008" target="_blank" title="It opens in new window">CrossRef 14. Ding, G, Wu, Q, Yao, Y, Wang, J, Chen, Y (2013) Kernel-based learning for statistical signal processing in cognitive radio networks. IEEE Signal Process. Mag 30: pp. 126-136 10.1109/MSP.2013.2251071" target="_blank" title="It opens in new window">CrossRef 15. Zhang, J, Varadharajan, V (2008) A new security scheme for wireless sensor networks. IEEE Globecom 2008. pp. 1-5 10.1109/GLOCOMW.2008.ECP.81" target="_blank" title="It opens in new window">CrossRef 16. Sakran, H, Shokair, M, Nasr, O, El-Rabaie, S, El-Azm, AA (2012) Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Commun 6: pp. 2676-2687 10.1049/iet-com.2011.0638" target="_blank" title="It opens in new window">CrossRef 17. Chen, C, Song, M, Xin, C, Backens, J (2013) A game-theoretical anti-jamming scheme for cognitive radio networks. IEEE Netw 27: pp. 22-27 10.1109/MNET.2013.6523804" target="_blank" title="It opens in new window">CrossRef 18. Jo, M, Han, L, Kim, D, In, HP (2013) Selfish attack and detection in cognitive radio ad-hoc networks. IEEE Netw 27: pp. 46-50 10.1109/MNET.2013.6523808" target="_blank" title="It opens in new window">CrossRef 19. Ding, G, Wang, J, Wu, Q, Song, F, Chen, Y (2013) Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: how to cooperate?. IEEE Sensors J 13: pp. 4247-4255 10.1109/JSEN.2013.2264161" target="_blank" title="It opens in new window">CrossRef 20. Gao, Z, Zhu, H, Li, S, Du, S (2012) Security and privacy of collaborative spectrum sensing in cognitive radio networks. IEEE Wireless Commun 19: pp. 106-112 10.1109/MWC.2012.6393525" target="_blank" title="It opens in new window">CrossRef 21. Pietro, RD, Oligeri, G (2013) Jamming mitigation in cognitive radio networks. IEEE Netw 27: pp. 10-15 10.1109/MNET.2013.6523802" target="_blank" title="It opens in new window">CrossRef 22. Wang, J, Sun, B, Niu, X, Yang, Y (2013) Distributed trust model based on parameter modeling. J. Commun 34: pp. 1-13 23. Shi, Z, Liu, J, Wang, Z (2010) Dynamic P2P trust model based on time-window feedback mechanism. J. Commun 31: pp. 120-129 24. Duan, L, Min, AW, Huang, J, Shin, KG (2012) Attack prevention for collaborative spectrum sensing in cognitive radio networks. IEEE J. Selected Areas Commun 30: pp. 1658-1665 10.1109/JSAC.2012.121009" target="_blank" title="It opens in new window">CrossRef 25. He, X, Dai, H, Ning, P (2013) A Byzantine attack defender in cognitive radio networks: the conditional frequency check. IEEE Trans. Wireless Commun 12: pp. 1658-1665 26. Gu, L, Zheng, S, Yang, Y (2009) Modern Cryptography. 27. Wei, Z, Feng, Z, Zhang, Q, Li, W (2012) Three regions for space-time spectrum sensing and access in cognitive radio networks. IEEE Globecom 2012. pp. 1283-1288 28. Liu, S, Ahmad, I, Bai, Y, Feng, Z, Zhang, Q, Zhang, Y (2013) A novel cooperative sensing based on spatial distance and reliability clustering scheme in cognitive radio system. VTC Fall 2013. pp. 1-5
- 刊物主题:Signal, Image and Speech Processing;
- 出版者:Springer International Publishing
- ISSN:1687-6180
文摘
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.
| |
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.
| |