Login | Register

A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks

Title:

A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks

Khasawneh, Mahmoud and Agarwal, Anjali (2017) A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks. Security and Communication Networks, 2017 . pp. 1-16. ISSN 1939-0114

[thumbnail of agarwal-SCN-2017.pdf]
Preview
Text (application/pdf)
agarwal-SCN-2017.pdf - Published Version
Available under License Spectrum Terms of Access.
1MB

Official URL: http://dx.doi.org/10.1155/2017/3261058

Abstract

Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary nodes can threaten these spectrum sensing results by launching passive and active attacks that prevent legitimate nodes from using the spectrum efficiently. Securing the spectrum sensing process has become an important issue in CRNs in order to ensure reliable and secure spectrum sensing and fair management of resources. In this paper, a novel collaborative approach during spectrum sensing process is proposed. It monitors the behavior of sensing nodes and identifies the malicious and misbehaving sensing nodes. The proposed approach measures the node’s sensing reliability using a value called belief level. All the sensing nodes are grouped into a specific number of clusters. In each cluster, a sensing node is selected as a cluster head that is responsible for collecting sensing-reputation reports from different cognitive nodes about each node in the same cluster. The cluster head analyzes information to monitor and judge the nodes’ behavior. By simulating the proposed approach, we showed its importance and its efficiency for achieving better spectrum security by mitigating multiple passive and active attacks.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Electrical and Computer Engineering
Item Type:Article
Refereed:Yes
Authors:Khasawneh, Mahmoud and Agarwal, Anjali
Journal or Publication:Security and Communication Networks
Date:2017
Funders:
  • Concordia Open Access Author Fund
Digital Object Identifier (DOI):10.1155/2017/3261058
ID Code:983211
Deposited By: Danielle Dennie
Deposited On:14 Nov 2017 15:33
Last Modified:18 Jan 2018 17:56

References:

J. Mitola, “Cognitive radio for flexible multimedia communications,” in Proceedings of the IEEE International Workshop on Mobile Multimedia Communications (MoMuC '99), pp. 3–10, IEEE MoMuC, San Diego, CA, USA, USA, 1999.

S. M. Mishra, D. Cabric, C. Chang et al., “A real time Cognitive Radio testbed for physical and link layer experiments,” in Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN '05), pp. 562–567, Baltimore, MD, USA, November 2005.

I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey,” Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006.

M. Khasawneh, S. Alrabaee, A. Agarwal, N. Goel, and M. Zaman, “Power trading in cognitive radio networks,” Journal of Network and Computer Applications, vol. 65, pp. 155–166, 2016.

S. Alrabaee, M. Khasawneh, A. Agarwal, N. Goel, and M. Zaman, “Applications architectures and protocol design issues for cognitive radio networks: a survey,” International Journal of Wireless and Mobile Computing, vol. 7, no. 5, pp. 415–427, 2014.

W. El-Hajj, H. Safa, and M. Guizani, “Survey of security issues in cognitive radio networks,” Journal of Internet Technology, vol. 12, no. 2, pp. 1–18, 2011.

L. Lai, Y. Fan, and H. V. Poor, “Quickest detection in cognitive radio: a sequential change detection framework,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), pp. 1–5, New Orleans, La, USA, December 2008.

D. Das and S. Das, “Primary user emulation attack in cognitive radio networks: a survey,” International Journal of Computer Networks and Wireless Communications, vol. 3, no. 3, pp. 312–318, 2013.

Z. Jin, S. Anand, and K. P. Subbalakshmi, “Detecting primary user emulation attacks in dynamic spectrum access networks,” in Proceedings of the IEEE International Conference on Communications (ICC '09), Dresden, Germany, June 2009.

A. Alahmadi, M. Abdelhakim, J. Ren, and T. Li, “Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 5, pp. 772–781, 2014.

F. Richard Yu, H. Tang, M. Huang, Z. Li, and P. C. Mason, “Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios,” in Proceedings of the IEEE Military Communications Conference (MILCOM '09), pp. 1–7, October 2009.

Y. Han, Q. Chen, and J.-X. Wang, “An enhanced D-S theory cooperative spectrum sensing algorithm against SSDF attack,” in Proceedings of the 75th Vehicular Technology Conference (VTC '12), Yokohama, Japan, June 2012.

A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney, “Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks,” IEEE Transactions on Signal Processing, vol. 59, no. 2, pp. 774–786, 2011.

S. Althunibat, V. Sucasas, H. Marques, J. Rodriguez, R. Tafazolli, and F. Granelli, “On the trade-off between security and energy efficiency in cooperative spectrum sensing for cognitive radio,” IEEE Communications Letters, vol. 17, no. 8, pp. 1564–1567, 2013.

V. Sucasas, S. Althunibat, A. Radwan et al., “Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks,” Security and Communication Networks, vol. 8, no. 18, pp. 3978–3994, 2015.

V. Zlomislić, K. Fertalj, and V. Sruk, “Denial of service attacks: an overview,” in Proceedings of the 9th Iberian Conference on Information Systems and Technologies (CISTI '14), Barcelona, Spain, June 2014.

M. Khasawneh and A. Agarwal, “A collaborative approach towards securing spectrum sensing in cognitive radio networks,” Procedia Computer Science, vol. 94, pp. 302–309, 2016.

M. Khasawneh and A. Agarwal, “A secure routing algorithm based on nodes behavior during spectrum sensing in cognitive radio networks,” in Proceedings of the 35th IEEE International Performance Computing and Communications Conference (IPCCC '16), Las Vegas, NV, USA, December 2016.

R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee, and Y. Song, “Group-based trust management scheme for clustered wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698–1712, 2009.

C. Fu, X. Gao, M. Liu, X. Liu, L. Han, and J. Chen, “GRAP: Grey risk assessment based on projection in ad hoc networks,” Journal of Parallel and Distributed Computing, vol. 71, no. 9, pp. 1249–1260, 2011.

J. Li, R. Li, and K. Kato, “Future trust management framework for mobile ad hoc networks,” IEEE Communications Magazine, vol. 46, no. 4, pp. 108–114, 2008.

H. H. Ngo, X. Wu, P. D. Le, C. Wilson, and B. Srinivasan, “Dynamic key cryptography and applications,” International Journal of Network Security, vol. 10, no. 3, pp. 161–174, 2010.

F. Lin, Z. Hu, S. Hou et al., “Cognitive radio network as wireless sensor network security consideration,” in Proceedings of the IEEE National Aerospace and Electronics Conference (NAECON '11), pp. 324–328, Dayton, OH, USA, July 2011.

Z. Yuan, D. Niyato, H. Li, J. B. Song, and Z. Han, “Defeating primary user emulation attacks using belief propagation in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 10, pp. 1850–1860, 2012.

L. Li and C. Chigan, “Fuzzy C-Means clustering based secure fusion strategy in collaborative spectrum sensing,” in Proceedings of the 2014 1st IEEE International Conference on Communications, ICC 2014, pp. 1355–1360, Sydney, Australia, June 2014.

J. Soto, S. Queiroz, M. Gregori, and M. Nogueira, “A flexible multi-criteria scheme to detect primary user emulation attacks in CRAHNs,” in Proceedings of the 2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '13), Madrid, Spain, June 2013.

M. J. Saber and S. M. S. Sadough, “Optimal energy detection in cognitive radio networks in the presence of malicious users,” in Proceedings of the 3rd International Conference on Computer and Knowledge Engineering, ICCKE 2013, pp. 173–177, Mashhad, Iran, November 2013.

W. Wang, H. Li, Y. Sun, and Z. Han, “Attack-proof collaborative spectrum sensing in cognitive radio networks,” in Proceedings of the 43rd Annual Conference on Information Sciences and Systems (CISS '09), pp. 130–134, Baltimore, MD, USA, March 2009.

A. W. Min, K. G. Shin, and X. Hu, “Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation,” IEEE Transactions on Mobile Computing, vol. 10, no. 10, pp. 1434–1447, 2011.

L. Duan, A. W. Min, J. Huang, and K. G. Shin, “Attack prevention for collaborative spectrum sensing in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 9, pp. 1658–1665, 2012.

H. A. Shah, M. Usman, and I. Koo, “Bioinformatics-inspired quantized hard combination-based abnormality detection for cooperative spectrum sensing in cognitive radio networks,” IEEE Sensors Journal, vol. 15, no. 4, pp. 2324–2334, 2015.

W. Wang, L. Chen, K. G. Shin, and L. Duan, “Thwarting intelligent malicious behaviors in cooperative spectrum sensing,” IEEE Transactions on Mobile Computing, vol. 14, no. 11, pp. 2392–2405, 2015.

K.-L. A. Yau, N. Ramli, W. Hashim, and H. Mohamad, “Clustering algorithms for Cognitive Radio networks: A survey,” Journal of Network and Computer Applications, vol. 45, pp. 79–95, 2014.

M. Khasawneh, A. Agarwal, N. Goel, M. Zaman, and S. Alrabaee, “Sureness efficient energy technique for cooperative spectrum sensing in cognitive radios,” in Proceedings of the International Conference on Telecommunications and Multimedia (TEMU '12), pp. 25–30, Chania, Greece, August 2012.

M. Khasawneh and A. Agarwal, “A secure and efficient authentication mechanism applied to cognitive radio networks,” IEEE Access Journal, vol. 5, pp. 15597–15608, 2017
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top