CFP last date
20 June 2024
Reseach Article

A Secure Collaborative Spectrum Sensing Mechanism based on User Trust in Cognitive Radio Networks

Published on August 2017 by Sumit Kar, Srinivas Sethi
National Conference on Next Generation Computing and its Applications in Computer Science and Technology
Foundation of Computer Science USA
NGCAST2016 - Number 1
August 2017
Authors: Sumit Kar, Srinivas Sethi
c603b20d-d9de-49b6-a4f1-37606ab6c879

Sumit Kar, Srinivas Sethi . A Secure Collaborative Spectrum Sensing Mechanism based on User Trust in Cognitive Radio Networks. National Conference on Next Generation Computing and its Applications in Computer Science and Technology. NGCAST2016, 1 (August 2017), 11-15.

@article{
author = { Sumit Kar, Srinivas Sethi },
title = { A Secure Collaborative Spectrum Sensing Mechanism based on User Trust in Cognitive Radio Networks },
journal = { National Conference on Next Generation Computing and its Applications in Computer Science and Technology },
issue_date = { August 2017 },
volume = { NGCAST2016 },
number = { 1 },
month = { August },
year = { 2017 },
issn = 0975-8887,
pages = { 11-15 },
numpages = 5,
url = { /proceedings/ngcast2016/number1/28122-1607/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Next Generation Computing and its Applications in Computer Science and Technology
%A Sumit Kar
%A Srinivas Sethi
%T A Secure Collaborative Spectrum Sensing Mechanism based on User Trust in Cognitive Radio Networks
%J National Conference on Next Generation Computing and its Applications in Computer Science and Technology
%@ 0975-8887
%V NGCAST2016
%N 1
%P 11-15
%D 2017
%I International Journal of Computer Applications
Abstract

The rapid growth of wireless applications has increases the importance for efficient utilization of the scarce spectrum resources. Cognitive Radio Network (CRN) is an emerging technology which leads to solve these problems through dynamic utilization of the unused licensed spectrum. Spectrum sensing is a key function of cognitive radio to find the spectrum holes and Collaborative or cooperative sensing has been proposed to improve the ability. On the other hand, the flexibility in collaborative spectrum sensing opens way to a number of security vulnerabilities. While the set of security challenges in CRN are diverse, this work focus on one of these major threats called Spectrum Sensing Data Falsification (SSDF) attack or Byzantine attack. In SSDF attack, the malicious member of the network sends false sensing reports to the cooperative sensing process and that can break down the normal activities of the whole CRN. This paper presents a novel trust calculation based mechanism that consists of two major steps: Trust value evaluation stage and malicious node detection stage to thwart SSDF attack in the cooperative sensing process of CRN.

References
  1. "Spectrum policy task force report". Technical Report, FCC ET Docket 02-135, Federal CommunicationsCommission, Nov 2002.
  2. R. Chen, J. Park, and K. Bian. "Robust distributed spectrum sensing in cognitive radio networks," In proc. of IEEE Conference on Computer Communications (INFOCOM), pp. 1876-1884, 2008.
  3. I. F. Akyildiz, W. -Y. Lee, M. C. Vuran, and S. Mohanty. "Next gener-ation/ Dynamic spectrum access/ Cognitive radio wireless networks: A survey," Computer Networks, 50(13), pp. 2127-2159, May 2006.
  4. P. Kaligineedi, M. Khabbazian, and V. K. . Bhargava, "Secure cooperative sensing techniques for cognitive radio systems,". In Proceedings of IEEE International Conference on Communication, pp. 3406-3410, IEEE, May 2008.
  5. W. Wang, H. Li, Y. Sun, and Z. Han, "Attack-proof collaborative spectrum sensing in cognitive radio networks," In CISS, pp. 130-134. IEEE, March 2009.
  6. W. Wang, H. Li, Y. Sun, and Z. Han, "Catchit: Detect malicious nodes in collaborative spectrum sensing," In GLOBECOM, pp. 1-6. IEEE, 2009.
  7. A. Attar, H. Tang, A. V. Vasilakos, F. R. Yu, and V. C. M. Leung. "A survey of security challenges in cognitive radio networks: Solutions and future research directions," Proceedings of the IEEE, 100(12), pp. 3172-3186, December 2012.
  8. A. G. Fragkiadakis, E. Z. Tragos, and I. . G. Askoxylakis. "A survey on security threats and detection techniques in cognitive radio networks". IEEE Communications Surveys and Tutorials, 15(1), pp. 428-445, 2013.
  9. A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney, "Countering byzantine attacks in cognitive radio networks," In ICASSP, pp. 3098-3101, IEEE, 2010.
  10. J. Feng, Y. Zhang, G. Lu and L. Zhang, "Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment," 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1656-1661, 2013.
  11. L. Li, F. Li and J. Zhu, "A method to defense against cooperative SSDF attacks in Cognitive Radio Networks," In Signal Processing, Communication and Computing (ICSPCC), 2013 IEEE International Conference on, pp. 1-6, 2013.
  12. X. He, H. Dai and P. Ning, "A byzantine attack defender in cognitive radio networks: the conditional frequency check," IEEE Transactions on Wireless Communications, Vol. 12,No. 5, pp. 2512–2523, 2013.
  13. J. Li, Z. Feng and Z. Wei, Z. Feng and P. Zhang, "Security management based on trust determination in cognitive radio networks," EURASIP J. Adv. Sig. Proc. ,48 ,pp. 1-16, 2014.
  14. T. Bansal and B. Chen and P. Sinha, "FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions," IEEE Conference on Computer Communications, INFOCOM 2014, pp. 2517-2525, 2014.
  15. Q. Pei, B. Yuan, L. Li and H. Li, "A sensing and etiquette reputation-based trust management for centralized cognitive radio networks," Neurocomputing, 101, pp. 129-138 ,2013.
  16. D. Martins and H. Guyennet (2011). "Security in wireless sensor networks: a survey of attacks and countermeasures", International Journal of Space-Based and Situated Computing, 1(2-3), pp. 151-162, 2011.
  17. S. Kar, S. Sethi and M. K. Bhuyan, "Security challenges in cognitive radio network and defending against Byzantine attack: a survey", Int. J. Communication Networks and Distributed Systems, Vol. 17, No. 2, Inderscience, pp. 120–146, 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Cognitive Radio Network Spectrum Sensing Data Falsification (ssdf) Attack Trust Security Threats Malicious Node Detection