Abstract

Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.

Highlights

  • Wireless communication technology is in a period of rapid development, and growing business demand has driven communication technology renewal and development

  • Cognitive radio network (CRN) has been brought to the forefront due to its potential to solve the conflict between limited spectrum supply and spectrum demand from ever-increasing wireless applications and services, which is defined as a wireless network employing technology to obtain knowledge of its operational and geographical environment, established policies, and its internal state; to dynamically and autonomously adjust its operational parameters and protocols according to its obtained

  • Simulation results show that successful transmission rate of honest users are safeguarded effectively, under the security management based on trust value mechanism, whereas misbehaving users are shielded in part or entirely, and validate a better anti-attack ability than the mechanism has

Read more

Summary

Introduction

Wireless communication technology is in a period of rapid development, and growing business demand has driven communication technology renewal and development. Pietro et al in [21] proposed an anti-jamming technology based on timedelayed broadcast scheme, which opens up a new area for cognitive radio network security This mechanism takes the greedy malicious users into account which are mainly improving the access opportunities through misconduct. A novel trust mechanism Security Management based on Trust Determination (SMTD) is proposed for solving the security issue in CRNs. A centralized management in FC [24,25] is needed to manage access of cognitive users effectively, and FC has absolute authority of cognitive user authentication management and can carry out effective punishment for the attackers, while attacks are unable to avoid only through signal detecting. Cluster heads: collecting trust values of cognitive users and reporting to FC by interaction; reporting misbehaving users’ information to FC timely while an attack is detected.

Update There are two update forms of trust value stored in FC:
Trust value storage
Interaction between CH and its associated cognitive users
Indirect trust value
The analysis of complexity from computational aspect
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.