Abstract
The security issues of cognitive radio network have taken more attention recently due to the new challenges in wireless communication. Confronts related to such a debate seem more predominant in presence of the malicious secondary users when the transmission range of licensed users is shorter compared to the network size. In this paper, a model is introduced which verifies the distance both geographically and through the measuring distance obtained by received power of cognitive user. This is achieved by minimizing the interference to the primary licensed user and upon the faithful operation of the secondary user by calculating the trustworthiness of all users irrespective of their priority. This necessitates focus upon the free space propagation path loss of the transmitted signal. Thus, analysis of the trustworthiness becomes essential followed by calculation of link budget power that ensures the designing cost without extra overhead during a secured communication with the received power and free space propagation path loss.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sazia Parvin, Farook Khadree Husain, Omar Khadree Husain, SongHan, Biming Tian, and Elizabeth Chang: Cognitive Radio Network Security: A Survey. Elsevier Journal of Network and Computer Application. 1084–8045 (2012).
Theodore S. Rappaport: Wireless Communications Principals and Practice”, Second edition published by PEARSON Publication, Indian edition (2009).
Prasanna Venkatesan K. J. and Vijayarangan: Trust Based Algorithm for Secure Spectrum Access in Cognitive Radio Networks. K. R. Venugopal and L. M. Patnaik (Eds.) ICCN 2013, pp. 50–62 Elsevier Publications (2013).
Shrestha, Junu, Sunkara, Avinash, Thirunavukkarasu and Balaji: Security in Cognitive Radio. A project report to The Faculty of the Department of General Engineering of San Jose State University (2010).
Muhammad Faisal Amjad, Baber Aslam Afraa Attiah, and Cliff C. Zou: Towards trustworthy collaboration in spectrum sensing for ad hoc Cognitive Radio Networks. DOI:10.1007/s11276-015-1004-2 Springer Science & Business Media New York (2015).
www.utexas.edu/research/mopro/papercopy/chapter11.pdf (Retrieved as on 26.04.2016).
Jianwu Li, Zebing Feng, Zhiqing Wei, Zhiyong Feng, and Ping Zhang: Security Management Based on Trust Determination in Cognitive Radio Networks. DOI:10.1186/1687-6180-2014-48, EURASIP Journal on Advances in Signal Processing a Springer Open Journal (2014).
Julius Goldhirsh and Wolfhard J. Vogel: Handbook of Propagation Effects for Vehicular and Personal Mobile Satellite Systems (1998).
M. A. Alim, M. M. Rahman, M. M. Hossain and A. Al-Nahid: Analysis of Large-Scale Propagation Models for Mobile Communications in Urban Area. ISSN: 1947-5500 Vol.7 No.1, International Journal of Computer Science and Information Security (IJCSIS) (2010).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rout, A., Kar, A., Sethi, S. (2017). Analysis of Trustworthiness and Link Budget Power Under Free Space Propagation Path Loss in Secured Cognitive Radio Ad hoc Network. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_46
Download citation
DOI: https://doi.org/10.1007/978-981-10-3153-3_46
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3152-6
Online ISBN: 978-981-10-3153-3
eBook Packages: EngineeringEngineering (R0)