A Collaborative Approach towards Securing Spectrum Sensing in Cognitive Radio Networks

被引:5
作者
Khasawneh, Mahmoud [1 ]
Agarwal, Anjali [1 ]
机构
[1] Concordia Univ, 1455 De Maisonneuve Blvd W, Montreal, PQ H3G 1M8, Canada
来源
11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS | 2016年 / 94卷
关键词
Cognitive Radio; Belief Level; Misbehaving Node; USER EMULATION ATTACKS;
D O I
10.1016/j.procs.2016.08.045
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cognitive radio (CR) is introduced to accommodate the steady increment in the spectrum demand. Spectrum sensing is used to detect the unexploited sub-bands in the radio environment. In order to improve the accuracy of the spectrum sensing, the cooperative spectrum sensing method is assumed to be the best method to be used. However, misbehaving sensing nodes might falsify the spectrum sensing data to prevent legitimate nodes from utilizing the spectrum. Hence, wireless security has become an important issue in cognitive radio networks to ensure a reliable spectrum sensing and a fair resource allocation and management. A node misbehaves during the spectrum sensing phase by sending false sensing data to other cooperative sensing nodes. In this paper we propose a novel collaborative approach during spectrum sensing phase to monitor sensing nodes' behavior and identify the misbehaving sensing nodes. The proposed approach measures the node's reliability through a value called belief level (BL). The clustering method is used to divide all the sensing nodes in a specific number of clusters. Each cluster has a cluster head (CH) which is responsible for collecting sensing reports from different cognitive nodes in the same cluster about each other and identifying the misbehaving sensing nodes. Simulation results show the added value and the effectiveness of the proposed approach. (C) 2016 Published by Elsevier B.V.
引用
收藏
页码:302 / 309
页数:8
相关论文
共 19 条
[1]   NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey [J].
Akyildiz, Ian F. ;
Lee, Won-Yeol ;
Vuran, Mehmet C. ;
Mohanty, Shantidev .
COMPUTER NETWORKS, 2006, 50 (13) :2127-2159
[2]   Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard [J].
Alahmadi, Ahmed ;
Abdelhakim, Mai ;
Ren, Jian ;
Li, Tongtong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) :772-781
[3]  
Alrabaee S, 2014, ADV WIRELESS TECHNOL
[4]  
[Anonymous], 2009, P IEEE MILCOM 2009
[5]  
[Anonymous], 1999, 1999 IEEE INT WORKSH
[6]  
Feng Lin, 2011, NAECON 2011 - IEEE National Aerospace and Electronics Conference, P324, DOI 10.1109/NAECON.2011.6183125
[7]  
Jin Z., IEEE INT C COMM, P1
[8]  
Khasawneh M., 2012, 2012 International Conference on Telecommunications and Multimedia (TEMU), P25, DOI 10.1109/TEMU.2012.6294727
[9]  
Khasawneh M., 2016, 28 BIENN S COMM BSC1
[10]  
Khasawneh M., 2014, Recent Trends in Computer Networks and Distributed Systems Security SE - 44, V420, P496, DOI [10.1007/978-3-642-54525-2 44, DOI 10.1007/978-3-642-54525-244]