Security management based on trust determination in cognitive radio networks

被引:0
|
作者
Jianwu Li
Zebing Feng
Zhiqing Wei
Zhiyong Feng
Ping Zhang
机构
[1] Beijing University of Posts and Telecommunications,Key Laboratory of Universal Wireless Communications, Ministry of Education
[2] Beijing University of Posts and Telecommunications,Network information processing center, State Key Laboratory of switching technology and network
来源
EURASIP Journal on Advances in Signal Processing | / 2014卷
关键词
Security; CRNs; Honest users; Misbehaving users; Trust value; Punishment;
D O I
暂无
中图分类号
学科分类号
摘要
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.
引用
收藏
相关论文
共 50 条
  • [41] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [42] Testbed Validation of Security-Aware Channel Assignment in Cognitive Radio IoT Networks
    Khadr, Monette H.
    Salameh, Haythem Bany
    Ayyash, Moussa
    Almajali, Sufyan
    Elgala, Hany
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [43] Enhancing grid security with trust management
    Lin, C
    Varadharajan, V
    Wang, Y
    Pruthi, V
    2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 303 - 310
  • [44] Securing cognitive radio networks
    Leon, O.
    Hernandez-Serrano, J.
    Soriano, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2010, 23 (05) : 633 - 652
  • [45] Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
    Wei, Zhexiong
    Tang, Helen
    Yu, F. Richard
    Wang, Maoyu
    Mason, Peter
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (09) : 4647 - 4658
  • [46] TRUST BASED GRID SECURITY AND SECURITY MODELS
    Kavecky, Slavomir
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 81 - 92
  • [47] Transient Analysis for a Trust-Based Cognitive Radio Collaborative Spectrum Sensing Scheme
    Mousavifar, Seyed Ali
    Leung, Cyril
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (04) : 377 - 380
  • [48] Decentralized Trust in Distributed Networks: a Delegate-based Security Hardening Approach
    Gu, Jabeom
    Nah, Jaehoon
    Jang, Jongsoo
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (10): : 265 - 272
  • [49] Blockchain-Based Security Enhancement and Spectrum Sensing in Cognitive Radio Network
    Ashish Khanna
    Poonam Rani
    Tariq Hussain Sheikh
    Deepak Gupta
    Vineet Kansal
    Joel J. P. C. Rodrigues
    Wireless Personal Communications, 2022, 127 (3) : 1899 - 1921
  • [50] An Authenticated Trust Based Security Mechanism for Video Transmission in Wireless Mesh Networks
    Loret, J. B. Shajilin
    Kumar, T. Ganesh
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (04): : 757 - 764