Trust-based Security for Community-based Cognitive Radio Networks

被引:8
|
作者
Parvin, Sazia [1 ]
Hussain, Farookh Khadeer [1 ]
机构
[1] Curtin Univ Technol, Digital Ecosyst & Business Intelligence Inst, Perth, WA, Australia
来源
2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2012年
关键词
Security; Trust; Community; Radio; Networks; User;
D O I
10.1109/AINA.2012.121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cognitive Radio (CR) is considered to be a necessary mechanism to detect whether a particular segment of the radio spectrum is currently in use, and to rapidly occupy the temporarily unused spectrum without interfering with the transmissions of other users. As Cognitive Radio has dynamic properties, so a member of Cognitive Radio Networks may join or leave the network at any time. These properties mean that the issue of secure communication in CRNs becomes more critical than for other conventional wireless networks. This work thus proposes a trust-based security system for community-based CRNs. A CR node's trust value is analyzed according to its previous behavior in the network and, depending on this trust value, it is decided whether this member node can take part in the communication of CRNs. For security purposes, we have designed our model to ensure that the proposed approach is secure in different contexts.
引用
收藏
页码:518 / 525
页数:8
相关论文
共 50 条
  • [1] TRUST-BASED SPECTRUM SHARING FOR COGNITIVE RADIO NETWORKS
    Parvin, Sazia
    Hussain, Farookh Khadeer
    Han, Song
    Hussain, Omar Khadeer
    JOURNAL OF INTERCONNECTION NETWORKS, 2011, 12 (03) : 155 - 171
  • [2] Trust-based Throughput in Cognitive Radio Networks
    Parvin, Sazia
    Hussain, Farookh Khadeer
    Hussain, Omar Khadeer
    Al Faruque, Abdullah
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 713 - 720
  • [3] Trust-based Data Fusion Mechanism Design in Cognitive Radio Networks
    Wang, Ji
    Chen, Ing-Ray
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 53 - 59
  • [4] A Trust-Based Technique for Secure Spectrum Access in Cognitive Radio Networks
    Kar, Sumit
    Sethi, Srinivas
    Sahoo, Ramesh Kumar
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 9 - 18
  • [5] Security management based on trust determination in cognitive radio networks
    Li, Jianwu
    Feng, Zebing
    Wei, Zhiqing
    Feng, Zhiyong
    Zhang, Ping
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2014,
  • [6] Security management based on trust determination in cognitive radio networks
    Jianwu Li
    Zebing Feng
    Zhiqing Wei
    Zhiyong Feng
    Ping Zhang
    EURASIP Journal on Advances in Signal Processing, 2014
  • [7] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [8] Trust-Based Security Protocol Against Blackhole Attacks in Opportunistic Networks
    Gupta, Sahil
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Kumar, Arun
    Obaidat, Mohammed S.
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 724 - 729
  • [9] Trust-based security for the OLSR routing protocol
    Adnane, Asma
    Bidan, Christophe
    de Sousa Junior, Rafael Timoteo
    COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1159 - 1171
  • [10] Trust-based Cooperative Spectrum Sensing Against SSDF Attacks in Distributed Cognitive Radio Networks
    Wang, Ji
    Chen, Ing-Ray
    Tsai, Jeffrey J. P.
    Wang, Ding-Chau
    2016 IEEE INTERNATIONAL WORKSHOP TECHNICAL COMMITTEE ON COMMUNICATIONS QUALITY AND RELIABILITY (CQR), 2016, : 13 - 18