Abstract
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes’ forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes’ trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.
Highlights
The shortage of wireless spectrum resources is the bottleneck of the sustainable development of wireless mobile communication and service application
As an intelligent revolutionary spectrum sharing technology, CR [1] is regarded as the hottest future wireless technology. It can perceive SOPs [2], and can adjust transmitting power, operating frequency and other parameters according to the dynamic changes of the environment, enabling CR terminals to opportunistically work in licensed frequency bands
Based on the characteristics of dynamic changes of node SOPs, in the routing model, trust mechanism is combined to enhance the robustness of CRN route under selective forwarding attack
Summary
The shortage of wireless spectrum resources is the bottleneck of the sustainable development of wireless mobile communication and service application. Distributed CRNs are faced with attack behaviors [12] on routing in wireless sensor networks, for example, in selective forwarding attack malicious nodes make themselves in the path of data transmission through exchanging false routing information.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have