OntoBlock: a novel ontological-based and blockchain enabled spectrum sensing framework for detection of malicious users in cognitive radio internet of things (CR-IoT) networks

被引:0
作者
Marriwala N.K. [1 ]
Shukla V.K. [2 ]
Raju A.R. [3 ]
Panda S. [4 ]
S S. [2 ]
Purad H.C. [6 ]
机构
[1] Electronics and Communication Engineering Department, University Institute of Engineering and Technology, Kurukshetra University, Haryana, Kurukshetra
[2] Information Technology Head of Academics–School of Engineering Architecture Interior Design, Amity University Dubai, Dubai International Academic City, Dubai
[3] Department of Computer Science and Engineering, Mahatma Gandhi Institute of Technology, Hyderabad
[4] Department of Electrical, Electronics and Communication Engineering, GITAM School of Technology, Bengaluru Campus, Karnataka, Bengaluru
[5] CMR Technical Campus, Hyderabad
[6] Department of AIML, BITM, Karnataka, Ballari
关键词
Blockchain; Cognitive radio; Internet of things (IoT); Ontology; Spectrum sensing;
D O I
10.1007/s41870-024-02011-9
中图分类号
学科分类号
摘要
CR-IoT networks can benefit from the idea of blockchain technology to achieve accurate decisions in order to provide very high-accuracy spectrum sensing in the network. It allows for multi-user cooperation as the sensing readings are being exchanged in the spectrum. It leads to security issues in CR-IoT networks. Thus, in order to increase the quality of decision-making in spectrum sensing, the given paper introduces an ontological framework with a blockchain-enabled system to detect malicious users in networks. The proposed framework first captures network packets from available Wi-Fi, followed by the creation of blocks with private, public, and hash keys. The keys are used to encode information about the nodes, such as confidential information and their location, data relative to users, their position where packets are delivered, etc. This is subsequently followed by the generation of network ontology, which includes parsing, computation of similarity, and reduction in clustered packets. Finally, the performance of the suggested mechanism is validated using a set of evaluation measures such as authentication rate, intrusion rate, average network throughput time consumption, and energy efficiency. As seen from the findings, it is evident that the proposed framework performs better than existing recent studies, thereby improving the performance of CR-IoT networks. © Bharati Vidyapeeth's Institute of Computer Applications and Management 2024.
引用
收藏
页码:3913 / 3921
页数:8
相关论文
共 25 条
  • [1] Sudha K., Kumari K.A., Varunika D., A Critical Survey on Security Issues in Cognitive Radio Networks, International Conference on Intelligent Systems for Communication, Iot and Security (Iciscois), 2023, pp. 292-297, (2023)
  • [2] Zareei M., Vargas-Rosales C., Hernndez R.V., Azpilicueta E., Efficient Transmission Power Control for Energy-harvesting Cognitive Radio Sensor Network, IEEE 30Th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops), pp. 1-5, (2019)
  • [3] Das A., Das N., Cooperative Cognitive Radio for Wireless Opportunistic Networks, 2019 11Th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, pp. 574-576, (2019)
  • [4] Chen S.H., Chung T.Y., Chen Y.M., Game theoretical approaches for transport-aware channel selection in cognitive radio networks, J Wirel Com Netw, 2010, (2010)
  • [5] Giri M.K., Majumder S., Extreme learning machine based identification of malicious users for secure cooperative spectrum sensing in cognitive radio networks, Wirel Pers Commun, 130, pp. 1993-2012, (2023)
  • [6] Clement J.C., Sriharipriya K.C., Robust Spectrum Sensing Scheme against Malicious Users Attack in a Cognitive Radio Network, International Conference on Electrical, Computer and Energy Technologies (ICECET), 2021, pp. 1-4, (2021)
  • [7] Brinda V., Bhuvaneshwari M., Identifying malicious secondary user presence within primary user range in cognitive radio networks, Wirel Pers Commun, 122, pp. 2687-2699, (2022)
  • [8] Yadav K., Roy S.D., Kundu S., Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network, 2018 2Nd International Conference on Electronics, Materials Engineering & Nano-Technology (Iementech), Kolkata, India, pp. 1-4, (2018)
  • [9] Sureka N., Gunaseelan K., Detection& Defense against Primary User Emulation Attack in Dynamic Cognitive Radio Networks, 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, pp. 505-510, (2019)
  • [10] Kar S., Sethi S., Sahoo R.K., A multi-factor trust management scheme for secure spectrum sensing in cognitive radio networks, Wirel Pers Commun, 97, pp. 2523-2540, (2017)