Security management based on trust determination in cognitive radio networks

被引:0
|
作者
Jianwu Li
Zebing Feng
Zhiqing Wei
Zhiyong Feng
Ping Zhang
机构
[1] Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education
[2] Beijing University of Posts and Telecommunications,Network information processing center, State Key Laboratory of switching technology and network
来源
EURASIP Journal on Advances in Signal Processing | / 2014卷
关键词
Security; CRNs; Honest users; Misbehaving users; Trust value; Punishment;
D O I
暂无
中图分类号
学科分类号
摘要
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.
引用
收藏
相关论文
共 50 条
  • [21] A Trust Management Scheme for Enhancing Security in Pervasive Wireless Networks
    Denko, Mieso K.
    Sun, Tao
    Woungang, Isaac
    Rodrigues, Joel J. P. C.
    Chao, Han-Chieh
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 3670 - +
  • [22] Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead
    Baldini, Gianmarco
    Sturman, Taj
    Biswas, Abdur Rahim
    Leschhorn, Ruediger
    Godor, Gyoezoe
    Street, Michael
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 355 - 379
  • [23] Reinforcement Learning-based Trust and Reputation Model for Cluster Head Selection in Cognitive Radio Networks
    Ling, Mee Hong
    Yau, Kok-Lim Alvin
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 256 - 261
  • [24] Security, Privacy, and Trust for Open Radio Access Networks in 6G
    Porambage, Pawani
    Christopoulou, Maria
    Han, Bin
    Habibi, Mohammad Asif
    Bogucka, Hanna
    Kryszkiewicz, Pawel
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2025, 6 : 332 - 361
  • [25] Security for Jamming-Aided Energy Harvesting Cognitive Radio Networks
    Ngoc Pham-Thi-Dan
    Khuong Ho-Van
    Thiem Do-Dac
    Son Vo-Que
    Son Pham-Ngoc
    2021 INTERNATIONAL SYMPOSIUM ON ELECTRICAL AND ELECTRONICS ENGINEERING (ISEE 2021), 2021, : 125 - 128
  • [26] A Reinforcement Learning-Based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks
    Ling, Mee Hong
    Yaug, Kok-Lim Alvin
    Qadir, Junaid
    Ni, Qiang
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2019, 5 (01) : 28 - 43
  • [27] A Security Framework for Cognitive Radio IP Based Cooperative Protocols
    Marques, Hugo
    Ribeiro, Jose
    Marques, Paulo
    Zuquete, Andre
    Rodriguez, Jonathan
    2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2009, : 2838 - 2842
  • [28] Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks
    Reshma, C. R.
    Kumar, B. R. Arun
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (05): : 168 - 174
  • [29] Security and Trust Management in MANET
    Singh, Akash
    Maheshwari, Manish
    Nikhil
    Kumar, Neeraj
    INFORMATION TECHNOLOGY AND MOBILE COMMUNICATION, 2011, 147 : 384 - 387
  • [30] A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions
    Attar, Alireza
    Tang, Helen
    Vasilakos, Athanasios V.
    Yu, F. Richard
    Leung, Victor C. M.
    PROCEEDINGS OF THE IEEE, 2012, 100 (12) : 3172 - 3186