Security management based on trust determination in cognitive radio networks

被引:0
|
作者
Jianwu Li
Zebing Feng
Zhiqing Wei
Zhiyong Feng
Ping Zhang
机构
[1] Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education
[2] Beijing University of Posts and Telecommunications,Network information processing center, State Key Laboratory of switching technology and network
来源
EURASIP Journal on Advances in Signal Processing | / 2014卷
关键词
Security; CRNs; Honest users; Misbehaving users; Trust value; Punishment;
D O I
暂无
中图分类号
学科分类号
摘要
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.
引用
收藏
相关论文
共 50 条
  • [31] An Overview and Future Directions on Physical-Layer Security for Cognitive Radio Networks
    Tashman, Deemah H.
    Hamouda, Walaa
    IEEE NETWORK, 2021, 35 (03): : 205 - 211
  • [32] Securing Cognitive Radio Networks with Dynamic Trust against Spectrum Sensing Data Falsification
    Sagduyu, Yalin E.
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 235 - 241
  • [33] Weighted-Cooperative Spectrum Sensing Scheme using Trust in Cognitive Radio Networks
    Feng, Jingyu
    Lu, Guangyue
    Bao, Zhiqiang
    PROCEEDINGS OF 2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP) VOLS 1-3, 2012, : 1693 - 1696
  • [34] Security and Trust in Opportunistic Networks - A Survey
    Alajeely, Majeed
    Doss, Robin
    Ahmad, Asma'a
    IETE TECHNICAL REVIEW, 2016, 33 (03) : 256 - 268
  • [35] Trust based Security schemes in Mobile Ad Hoc Networks - A Review
    Sivagurunathan, S.
    Prathapchandran, K.
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 291 - 295
  • [36] Trust-based security routing mechanism in mobile social networks
    Shuang Yang
    Xingwei Wang
    Shuang Zhang
    Bo Yi
    Min Huang
    Neural Computing and Applications, 2020, 32 : 5609 - 5620
  • [37] Cognitive radio network security: A survey
    Parvin, Sazia
    Hussain, Farookh Khadeer
    Hussain, Omar Khadeer
    Han, Song
    Tian, Biming
    Chang, Elizabeth
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1691 - 1708
  • [38] A Review on Security Threats in Cognitive Radio
    Banerjee, Abhinaba
    Das, Sushanta
    2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,
  • [39] Trust-based security routing mechanism in mobile social networks
    Yang, Shuang
    Wang, Xingwei
    Zhang, Shuang
    Yi, Bo
    Huang, Min
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (10) : 5609 - 5620
  • [40] A Trust-Based Security Enforcement in Disruption-Tolerant Networks
    Oleshchuk, Vladimir
    PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 1, 2017, : 514 - 517