Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks

被引:0
作者
Musinana, Chandra Sekhar [1 ]
Chilukuri, Kalyana Chakravarthy [1 ]
Reddy, Prasad P. V. G. D. [2 ]
机构
[1] JNT Univ, MVGR Coll Engn A, Dept Comp Sci & Engn, Kakinada, India
[2] Andhra Univ, Coll Engn, Dept Comp Sci & Syst Engn, Visakhapatnam, Andhra Pradesh, India
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2018年 / 12卷 / 05期
关键词
Cognitive Radio Network; Dynamic spectrum allocation; handoff; tracking user attack; Channel selection;
D O I
10.14257/ijsia.2018.12.5.04
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.
引用
收藏
页码:37 / 48
页数:12
相关论文
共 20 条
[1]   Correlation-Aware User Selection for Cooperative Spectrum Sensing in Cognitive Radio Ad Hoc Networks [J].
Cacciapuoti, Angela Sara ;
Akyildiz, Ian F. ;
Paura, Luigi .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (02) :297-306
[2]   Fault-Tolerant Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks [J].
Chen, Huifang ;
Zhou, Ming ;
Xie, Lei ;
Jin, Xu .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (04) :2379-2397
[3]   Defense against primary user emulation attacks in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Reed, Jeffrey H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) :25-37
[4]   Ensuring trustworthy spectrum sensing in cognitive radio networks [J].
Chen, Ruiliang ;
Park, Jung-Min .
2006 1ST IEEE WORKSHOP ON NETWORKING TECHNOLOGIES FOR SOFTWARE DEFINED RADIO NETWORKS, 2006, :110-+
[5]   A Novel Cooperative Spectrum Sensing Scheme Based on Clustering and Softened Hard Combination [J].
Duan, Jiaqi ;
Li, Yong .
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, :183-187
[6]   Joint Design of Spectrum Sensing and Channel Access in Cognitive Radio Networks [J].
El-Sherif, Amr A. ;
Liu, K. J. Ray .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (06) :1743-1753
[7]  
Ghasemi A, 2005, 2005 1ST IEEE INTERNATIONAL SYMPOSIUM ON NEW FRONTIERS IN DYNAMIC SPECTRUM ACCESS NETWORKS, CONFERENCE RECORD, P131
[8]  
Haykin S, 2009, P IEEE, V97, P849, DOI 10.1109/IITAW.2009.49
[9]  
Lazos L, 2009, P 6 ANN IEEE COMM SO, P1, DOI [10. 1109/SAHCN. 2009. 5168974, DOI 10.1109/SAHCN.2009.5168974]
[10]   Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks [J].
Ma, Jun ;
Zhao, Guodong ;
Li, Ye .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (11) :4502-4507