Trust management for secure cognitive radio vehicular ad hoc networks

被引:41
作者
He, Ying [1 ]
Yu, F. Richard [1 ]
Wei, Zhexiong [2 ]
Leung, Victor [3 ]
机构
[1] Carleton Univ, Dept Syst & Comp Eng, Ottawa, ON, Canada
[2] Cisco Syst Canada, Toronto, ON, Canada
[3] Univ British Columbia, Dept Elect & Comp Eng, Vancouver, BC, Canada
基金
加拿大创新基金会; 加拿大自然科学与工程研究理事会;
关键词
Cognitive cyber-physical systems; Cognitive radio vehicular ad hoc networks (CR-VANETs); Trust management; Spectrum sensing; Data transmission; ROUTING PROTOCOL; CONSENSUS; SYSTEMS; SCHEME; ATTACK;
D O I
10.1016/j.adhoc.2018.11.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there are growing interests in cognitive radio vehicular ad hoc networks (CR-VANETs), which is a kind of intelligent cyber-physical systems. In CR-VANETs, there are two main processes: spectrum sensing and data transmission. Although some excellent works have been done to address spectrum sensing security and data transmission security in CR-MANET5, these two important areas have traditionally been addressed separately in the literature. In this paper, we propose to use a common framework to study trust management so as to enhance security for both spectrum sensing and data transmission processes in CR-VANETs. We identify a new attack, named joint spectrum sensing and data transmission (JSSDT) attack, in which an attacker can report fake sensing data in the spectrum sensing process as well as drop packets in the data transmission process. Then, using recent advances in the theory of uncertain reasoning, we propose a unified trust management scheme for both spectrum sensing and data transmission processes in CR-VANETs. In addition, based on the unified trust model, we present a weighted consensus-based spectrum sensing scheme to protect the spectrum sensing process. Moreover, we apply the trust value derived from the unified trust model to enhance the security of the data transmission process in CR-VANETs. Simulation results show the effectiveness of the proposed trust-based security schemes. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:154 / 165
页数:12
相关论文
共 62 条
[1]  
Adjih C., 2005, P 2 OLSR WORKSH DOM
[2]  
Ahmed ANR, 2016, IEEE IMTC P, P1327
[3]   A survey on spectrum management in cognitive radio networks [J].
Akyildiz, Ian F. ;
Lee, Won-Yeol ;
Vuran, Mehmet C. ;
Mohanty, Shantidev .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) :40-48
[4]  
[Anonymous], P IEEE GLOBECOM 09 H
[5]  
[Anonymous], P IEEE INFOCOM 12 OR
[6]  
[Anonymous], P IEEE INFOCOM 08 PH
[7]  
[Anonymous], 2008, P 2 INT C UB INF MAN
[8]   Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks [J].
Bu, Shengrong ;
Yu, F. Richard ;
Liu, Xiaoping P. ;
Mason, Peter ;
Tang, Helen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (03) :1025-1036
[9]  
Buchegger S., 2002, P ACM MOBIHOC 02 LAU
[10]   Trusted cognitive radio networking [J].
Chen, Kwang-Cheng ;
Chen, Peng-Yu ;
Prasad, Neeli ;
Liang, Ying-Chang ;
Sun, Sumei .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (04) :467-485