Security management based on trust determination in cognitive radio networks

被引:0
|
作者
Jianwu Li
Zebing Feng
Zhiqing Wei
Zhiyong Feng
Ping Zhang
机构
[1] Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education
[2] Beijing University of Posts and Telecommunications,Network information processing center, State Key Laboratory of switching technology and network
来源
EURASIP Journal on Advances in Signal Processing | / 2014卷
关键词
Security; CRNs; Honest users; Misbehaving users; Trust value; Punishment;
D O I
暂无
中图分类号
学科分类号
摘要
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.
引用
收藏
相关论文
共 50 条
  • [1] Security management based on trust determination in cognitive radio networks
    Li, Jianwu
    Feng, Zebing
    Wei, Zhiqing
    Feng, Zhiyong
    Zhang, Ping
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2014,
  • [2] Trust-based Security for Community-based Cognitive Radio Networks
    Parvin, Sazia
    Hussain, Farookh Khadeer
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 518 - 525
  • [3] Trust and reputation management in cognitive radio networks: a survey
    Ling, Mee Hong
    Yau, Kok-Lim Alvin
    Poh, Geong Sen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2160 - 2179
  • [4] TRUST-BASED SPECTRUM SHARING FOR COGNITIVE RADIO NETWORKS
    Parvin, Sazia
    Hussain, Farookh Khadeer
    Han, Song
    Hussain, Omar Khadeer
    JOURNAL OF INTERCONNECTION NETWORKS, 2011, 12 (03) : 155 - 171
  • [5] A Survey on Security in Cognitive Radio Networks
    Khasawneh, Mahmoud
    Agarwal, Anjali
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 64 - 70
  • [6] A Trust Game Model for the Cognitive Radio Networks
    Bennaceur, Jihen
    Idoudi, Hanen
    Saidane, Leila Azouz
    5TH IFIP INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS PEMWN 16, 2016,
  • [7] Blockchain-Inspired Trust Management in Cognitive Radio Networks with Cooperative Spectrum Sensing
    Mahvash, Mahsa
    Moghim, Neda
    Mahdavi, Mojtaba
    Amiri, Mahdieh
    Shetty, Sachin
    PERVASIVE AND MOBILE COMPUTING, 2025, 106
  • [8] Securing Cognitive Radio Networks with Distributed Trust Management against Belief Manipulation Attacks
    Ding, Lei
    Savas, Onur
    Ahn, Gahng-Seop
    Deng, Hongmei
    2015 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2015,
  • [9] Using Trust Management to Defend against Routing Disruption Attacks for Cognitive Radio Networks
    Hou, Ling
    Wong, Angus K. Y.
    Yeung, Alan K. H.
    Choy, Steven S. O.
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-CHINA (ICCE-CHINA), 2016,
  • [10] An Improved Security Mechanism in Cognitive Radio Networks
    Wu, Huayi
    Bai, Baohua
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL V, 2010, : 254 - 257