scholarly journals An Authentication Based Approach for Prevention of Spectrum Sensing Data Falsification Attacks in Cognitive Radio Network

Author(s):  
Nikhil Marriwala ◽  
Himanshu Punj ◽  
Sunita Panda ◽  
Inderjeet Kaur ◽  
Deepak Rathore

Abstract This is the era of Intelligent cognitive radio network technology that provides the available spectrum with efficient utilization. Cognitive Radio technology must promise to allow interference-free spectrum access by users. The paper discusses the several attacks and motives of attacks. The authentication mechanism role to prevent the attacks for hassle-free spectrum utilization is demonstrated. In this paper, resolving the cognitive network security issues by the authentication mechanism and the methods and need of authentication is discussed. This paper addresses the research challenges in the way of securing the cognitive radio network and countermeasures in CRN security strategies. Cognitive radio is an empowering innovation that guarantees to achieve spectrum utilization. In cognitive radio networks, several security threats affect the process of cognitive radio. Spectrum sensing data falsification (SSDF) attack is most disruptive in which the malicious users degrade the decision-making process by sending the false sensing reports to data fusion centres thus preventing honest users from utilizing the spectrum. Hence, security is a very important issue in cognitive radio networks that needs to be addressed for proper utilization of available spectrum by the users. Cognitive radio technology must promise secure spectrum dynamic access to users. In this paper, to counter the SSDF attack, the trust-based security mechanism is demonstrated to authenticate the honest users and it is observed that the proposed framework in the MATLAB environment is efficient and able to detect malicious users. Cognitive radio technology is the strategy applied to the spectrum to make it efficient for wireless communication. The strategy is an intelligent way to access the spectrum as it can learn its environment and make decisions by easy adaptation of operating parameters. The multiple nodes scenario is a good perspective. Software-defined radio is an essential component of cognitive radio Here, secondary users can access the spectrum to primary users whenever their vacant spectrum is available. The initial step is to sense the spectrum available further steps are spectrum decision making, spectrum management, and spectrum mobility. The network is vulnerable to various attacks on spectrum sensing and policy protocols which lead to disturbing functionality of cognitive radio technology. The defence mechanism based on public-key cryptography is proposed in which PU is authenticated by appending signature provided to PU signal. Authentication with a tag to the primary users is another perspective proposed. CRN technology should provide integrity, confidentiality and authenticity to the users.

Author(s):  
Saed Alrabaee ◽  
Mahmoud Khasawneh ◽  
Anjali Agarwal

Cognitive radio technology is the vision of pervasive wireless communications that improves the spectrum utilization and offers many social and individual benefits. The objective of the cognitive radio network technology is to use the unutilized spectrum by primary users and fulfill the secondary users' demands irrespective of time and location (any time and any place). Due to their flexibility, the Cognitive Radio Networks (CRNs) are vulnerable to numerous threats and security problems that will affect the performance of the network. Little attention has been given to security aspects in cognitive radio networks. In this chapter, the authors discuss the security issues in cognitive radio networks, and then they present an intensive list of the main known security threats in CRN at various layers and the adverse effects on performance due to such threats, and the current existing paradigms to mitigate such issues and threats. Finally, the authors highlight proposed directions in order to make CRN more authenticated, reliable, and secure.


2020 ◽  
Vol 2 (2) ◽  
pp. 68-75
Author(s):  
Dr. Jennifer S. Raj

Significant enhancement of spectrum utilization can be performed by means of Cognitive Radio technology. A game theory based Cognitive Radio Network with Dynamic Spectrum Allocation model is proposed in this paper. M|M|1 queuing model is implemented along with Preemptive Resume Priority for accommodation of all the cases. An Incremental Weights-Decremental Ratios (IW-DR) algorithm based on priority-based scheduling is used for supplementing this theory. Regression models are used for restructuring and improving the efficiency of the system.


2018 ◽  
Vol 8 (6) ◽  
pp. 3673-3680
Author(s):  
K. Kimani ◽  
M. Njiraine

Frequency spectrum is a limited resource and the increasing demand caused by emerging services, augmented number of wireless users along with the demand for high-quality multimedia applications have resulted in the overcrowding of the allocated spectrum bands. The overcrowding of spectrum bands has exacerbated by the current spectrum licensing policy which has emerged as a bottleneck to efficient spectrum utilization, due to its inflexibility, resulting in most of the licensed spectrum being severely under-utilized. However, the problem of scarcity of spectrum bands and the inefficient utilization of the already allocated radio spectrum can be smartly addressed through spectrum sharing by enabling opportunistic usage of the underutilized frequency bands. One of the most exciting ways of spectrum sharing is cognitive radio technology which allows a wireless node to sense the environment, detect the network changes, and then make intelligent decisions by dynamically changing its reception or transmission parameters to communicate while ensuring that no interference is affected to the licensed users. It thus improves the spectrum utilization by reusing the unused or underutilized spectrum owned by the incumbent systems (primary systems). In this paper, a comprehensive survey and review of recent research about the advances in cognitive radio technology will be carried out. We will also evaluate the various spectrum sensing techniques in a cognitive radio network in the UHF/VHF bands allocated for TV broadcasting.


Big Data ◽  
2016 ◽  
pp. 1326-1346
Author(s):  
Saed Alrabaee ◽  
Mahmoud Khasawneh ◽  
Anjali Agarwal

Cognitive radio technology is the vision of pervasive wireless communications that improves the spectrum utilization and offers many social and individual benefits. The objective of the cognitive radio network technology is to use the unutilized spectrum by primary users and fulfill the secondary users' demands irrespective of time and location (any time and any place). Due to their flexibility, the Cognitive Radio Networks (CRNs) are vulnerable to numerous threats and security problems that will affect the performance of the network. Little attention has been given to security aspects in cognitive radio networks. In this chapter, the authors discuss the security issues in cognitive radio networks, and then they present an intensive list of the main known security threats in CRN at various layers and the adverse effects on performance due to such threats, and the current existing paradigms to mitigate such issues and threats. Finally, the authors highlight proposed directions in order to make CRN more authenticated, reliable, and secure.


Author(s):  
Masoud Moradkhani ◽  
Zeynab Zalani

Cognitive radio is regarded as one of the transformational technologies that play a fundamental role in establishment and development of next generation wireless networks. Clustering based cognitive radio networks can reduce the energy consumption and increase the spectrum sensing accuracy. In this paper, we investigate the performance of a cognitive radio network with a clustering architecture for cooperative spectrum sensing. The network efficiency is evaluated in terms of throughput and energy consumption, under fading channel conditions. Simulation results show significant improvement of energy efficiency compared to the conventional non-clustering method by ensuring allowable interference with primary users.


Author(s):  
Haiyan Ye ◽  
Jiabao Jiang

AbstractThe lack of spectrum resources restricts the development of wireless communication applications. In order to solve the problems of low spectrum utilization and channel congestion caused by the static division of spectrum resource, this paper proposes an optimal linear weighted cooperative spectrum sensing for clustered-based cognitive radio networks. In this scheme, different weight values will be assigned for cooperative nodes according to the SNR of cognitive users and the historical sensing accuracy. In addition, the cognitive users can be clustered, and the users with the better channel characteristics will be selected as cluster heads for gathering the local sensing information. Simulation results show that the proposed scheme can obtain better sensing performance, improve the detection probability and reduce the error probability.


2014 ◽  
Vol 2014 ◽  
pp. 1-6
Author(s):  
Hiep Vu-Van ◽  
Insoo Koo

Cognitive radio (CR) is a promising technology for improving usage of frequency band. Cognitive radio users (CUs) are allowed to use the bands without interference in operation of licensed users. Reliable sensing information about status of licensed band is a prerequirement for CR network. Cooperative spectrum sensing (CSS) is able to offer an improved sensing reliability compared to individual sensing. However, the sensing performance of CSS can be destroyed due to the appearance of some malicious users. In this paper, we propose a goodness-of-fit (GOF) based cooperative spectrum sensing scheme to detect the dissimilarity between sensing information of normal CUs and that of malicious users, and reject their harmful effect to CSS. The empirical CDF will be used in GOF test to determine the measured distance between distributions of observation sample set according to each hypothesis of licensed user signal. Further, the DS theory is used to combine results of multi-GOF tests. The simulation results demonstrate that the proposed scheme can protect the sensing process against the attack from malicious users.


Sign in / Sign up

Export Citation Format

Share Document