Trust-based Security for Community-based Cognitive Radio Networks

被引:8
|
作者
Parvin, Sazia [1 ]
Hussain, Farookh Khadeer [1 ]
机构
[1] Curtin Univ Technol, Digital Ecosyst & Business Intelligence Inst, Perth, WA, Australia
来源
2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2012年
关键词
Security; Trust; Community; Radio; Networks; User;
D O I
10.1109/AINA.2012.121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cognitive Radio (CR) is considered to be a necessary mechanism to detect whether a particular segment of the radio spectrum is currently in use, and to rapidly occupy the temporarily unused spectrum without interfering with the transmissions of other users. As Cognitive Radio has dynamic properties, so a member of Cognitive Radio Networks may join or leave the network at any time. These properties mean that the issue of secure communication in CRNs becomes more critical than for other conventional wireless networks. This work thus proposes a trust-based security system for community-based CRNs. A CR node's trust value is analyzed according to its previous behavior in the network and, depending on this trust value, it is decided whether this member node can take part in the communication of CRNs. For security purposes, we have designed our model to ensure that the proposed approach is secure in different contexts.
引用
收藏
页码:518 / 525
页数:8
相关论文
共 50 条
  • [21] TRUSED: A Trust-Based Security Evaluation Scheme for A Distributed Control System
    Ali, Saqib
    Anwar, Raja Waseem
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4381 - 4398
  • [22] An improved trust-based security framework for internet of things
    Renjith P.N.
    Ramesh K.
    Sasikumar S.
    International Journal of Information Technology, 2021, 13 (2) : 677 - 685
  • [23] Trust-based framework for security enhancement of wireless sensor
    Oleshchuk, Vladimir
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 623 - 627
  • [24] Distributed Trust-Based Monitoring Approach for Fog/Cloud Networks
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    Obaidat, Mohammad S.
    EMERGING RESEARCH IN DATA ENGINEERING SYSTEMS AND COMPUTER COMMUNICATIONS, CCODE 2019, 2020, 1054 : 55 - 65
  • [25] A survey study on trust-based security in Internet of Things: Challenges and issues
    Shirvani, Mirsaeid Hosseini
    Masdari, Mohammad
    INTERNET OF THINGS, 2023, 21
  • [26] Trust-based Relay Selection in Relay-based Networks
    Wu, Di
    Zhu, Gang
    Zhu, Li
    Ai, Bo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2587 - 2600
  • [27] TSME: a trust-based security scheme for message exchange in vehicular Ad hoc networks
    Abassi, Ryma
    Douss, Aida Ben Chehida
    Sauveron, Damien
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [28] A Survey on Trust & Trust-Based Schemes In VANETs
    Kavitha, M.
    Tangade, Shrikant S.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [29] Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN
    Biradar, Mallanagouda
    Mathapathi, Basavaraj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2023, 17 (01)
  • [30] Trust-based Classification in Community Policing: A Systematic Review
    Ogbonnia, Otuu Obinna
    Anajemba, Joseph Henry
    Chkwuma, Aguboshim Felix
    Sahoo, Deepak
    2023 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY, ISTAS, 2023,