Reputation-Aware Relay Selection With Opportunistic Spectrum Access: A Blockchain Approach

被引:8
作者
Ghourab, Esraa M. [1 ]
Bariah, Lina [2 ]
Muhaidat, Sami [1 ,3 ]
Sofotasios, Paschalis C. [4 ,5 ]
Al-Qutayri, Mahmoud [6 ]
Damiani, Ernesto
机构
[1] Khalifa Univ, KU Ctr Cyber Phys Syst, Dept Elect Engn & Comp Sci, 27788, Abu Dhabi, U Arab Emirates
[2] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
[3] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[4] Khalifa Univ, Ctr Cyber Phys Syst, Dept Elect Engn & Comp Sci, Abu Dhabi, U Arab Emirates
[5] Tampere Univ, Dept Elect Engn, Tampere 33014, Finland
[6] Khalifa Univ, Syst Onchip SoC Ctr, Dept Elect Engn & Comp Sci, Abu Dhabi, U Arab Emirates
来源
IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY | 2023年 / 4卷
关键词
Relays; Blockchains; Vehicle dynamics; Security; Protocols; Quality of service; Wireless networks; Blockchain; channel secrecy capacity; intercept probability; relay selection; security; spectrum sharing; vehicular network; PHYSICAL-LAYER SECURITY; POWER ALLOCATION; NETWORKS; INTERNET; SCHEME;
D O I
10.1109/OJVT.2023.3263804
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The highly dynamic nature of cognitive radio (CR) systems and their stringent latency requirements pose a significant challenge in the realization of efficient intelligent transport systems (ITS). In this paper, we investigate relay selection and opportunistic spectrum access in conjunction with blockchain technology in a secure manner. Specifically, we propose a cross-layer method for secure relay selection, where secondary relays (SRs) are granted access to available spectrum bands based on the balance of their respective virtual wallets. These virtual wallets, which are built based on the SRs' secrecy capacity and their behavior in the network, are the predominant factors that allow SRs to participate in an auction model. To quantify the trustworthiness of the SRs, we formulate a mathematical framework to evaluate the trust value of each SR, which is then leveraged for rewarding or penalizing the SR. Also, we develop an offline blockchain framework to store the information of participating relays and make it available for future operations, to detect reputable and non-reputable relays in the presence of multiple eavesdroppers. The stored reputations of the participating relays are used to develop a self-learning algorithm to exclude the non-reputable relays from the selection group. Finally, we present thorough numerical results to demonstrate the superiority of the proposed system in terms of security, credibility, and integrity.
引用
收藏
页码:389 / 403
页数:15
相关论文
共 37 条
[1]   Blockchain for smart communities: Applications, challenges and opportunities [J].
Aggarwal, Shubhani ;
Chaudhary, Rajat ;
Aujla, Gagangeet Singh ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond ;
Zomaya, Albert Y. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 144 :13-48
[2]  
Ariyarathna T, 2019, IEEE WCNC
[3]   Technical Issues on Cognitive Radio-Based Internet of Things Systems: A Survey [J].
Awin, Faroq A. ;
Alginahi, Yasser M. ;
Abdel-Raheem, Esam ;
Tepe, Kemal .
IEEE ACCESS, 2019, 7 :97887-97908
[4]   Blockchain and extreme learning machine based spectrum management in cognitive radio networks [J].
Babu, C. Rajesh ;
Amutha, B. .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (10)
[5]   Large Intelligent Surface-Assisted Nonorthogonal Multiple Access for 6G Networks: Performance Analysis [J].
Bariah, Lina ;
Muhaidat, Sami ;
Sofotasios, Paschalis C. ;
El Bouanani, Faissal ;
Dobre, Octavia A. ;
Hamouda, Walaa .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5129-5140
[6]  
Bilen, 2016, P IEEE 12 INT C WIR, P1
[7]   Blockchain Based Dynamic Spectrum Access of Non-Real-Time Data in Cyber-Physical-Social Systems [J].
Fan, Xin ;
Huo, Yan .
IEEE ACCESS, 2020, 8 :64486-64498
[8]   Blockchain-Guided Dynamic Best-Relay Selection for Trustworthy Vehicular Communication [J].
Ghourab, Esraa M. ;
Azab, Mohamed ;
Ezzeldin, Noha .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (08) :13678-13693
[9]   Benign false-data injection as a moving-target defense to secure mobile wireless communications [J].
Ghourab, Esraa M. ;
Azab, Mohamed .
AD HOC NETWORKS, 2020, 102
[10]   Spatiotemporal diversification by moving-target defense through benign employment of false-data injection for dynamic, secure cognitive radio network [J].
Ghourab, Esraa M. ;
Azab, Mohamed ;
Mansour, Ahmed .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 138 :1-14