Skip to main content

Advertisement

Log in

Securing coalitional game for distributed cooperative spectrum sensing in multi-channel cognitive radio networks

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

In this paper, a secure scheme is purposed for coalitional game in multi-channel cognitive radio networks. First, a distributed cooperative attack on multi-channel cooperative spectrum sensing is proposed. In the proposed attack, attackers play two coalitional games to maximize the number of invaded channels in a distributed manner. In the first game, attackers play with their fellow ones to allocate an optimal number of attackers for each channel, while in the second game, they play in the coalitions with other honest cognitive radios so as to conquer as many channels as possible. Then, a hierarchical ID-based key management scheme is proposed, where cognitive radios can only play on a certain number of requested channels and channel access for sensing is limited to the honest cognitive radios selected in the coalitional game. Simulation results show that the proposed attack can considerably decrease the number of potential channels with a low attack cost when security scheme is not considered, in addition to the energy efficiency of the proposed key management scheme. Finally, formal verification of the proposed key management scheme guarantees its immunity and effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

References

  1. Federal Communications Commission. (2002). Spectrum policy task force report, FCC 02–155.

  2. Zhao, Q., & Sadler, B. M. (2007). A survey of dynamic spectrum access: Signal processing, networking, and regulatory policy. IEEE Signal Processing Magazine, 24, 79–89.

    Article  Google Scholar 

  3. Cabric, D., & Brodersen, S. W. (2005). Implementation issues in spectrum sensing for cognitive radios. The 38th Asilomar Conference on Signals, Systems, and Computers, (pp. 124–130), Pacific Grove, CA, USA.

  4. Urkowitz, H. (1967). Energy detection of unknown deterministic signals. Proceedings of IEEE, 55, 523–231.

    Article  Google Scholar 

  5. Zhang, W., & Letaief, K. (2008). Cooperative spectrum sensing with transmit and relay diversity in cognitive networks. IEEE Transactions on Wireless Communications, 7, 4761–4766.

    Article  Google Scholar 

  6. Wang, W., Kasiri, B., Cai, J., & Alfa, A.S. (2010). Distributed cooperative multi-channel spectrum sensing based on a dynamic coalitional game. IEEE Global Communications Conference (GLOBECOM’10), (pp. 589–600), Miami, FL, USA.

  7. Isaac, J. T., Zeadally, S., & Camara, J. S. (2012). A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs). Electronic Commerce Research, Springer, 12(1), 97–123.

  8. Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: A trust model. Electronic Commerce Research, Springer, 4(4), 359–372.

  9. Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. IEEE Int’l Conf. on Computer Commun. (INFOCOM’08), (pp. 1876–1884), Phoenix, AZ, USA.

  10. Rawat, A.S., Anand, P., Hao, C., & Varshney, P.K. (2010). Countering byzantine attacks in cognitive radio networks. 2010 IEEE Int’l Conference on Acoustics Speech and Signal Processing (ICASSP’10), (pp. 3098–3101), Dallas, TX, USA.

  11. Rawat, A. S., Anand, P., Hao, C., & Varshney, P. K. (2011). Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Transactions on Signal Processing, 59(2), 774–786.

    Article  Google Scholar 

  12. He, X., Dai, H., & Ning, P. (2012). A byzantine attack defender: The conditional frequency check. IEEE Int’l Symposium on Information Theory (ISIT’12), (pp. 975–979), Boston, MA, USA.

  13. Du, R., Foo, E., & Boyd, C. (2008). Designing a secure e-tender submission protocol. Electronic Commerce Research, Springer, 8(3), 115–142.

  14. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Springer Lecture Notes in Computer Science, 196, 4753.

  15. Tan, Z. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, Springer, 12(4), 505–518.

  16. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612.

    Article  Google Scholar 

  17. Tan, E. C., Leong, P. C., & Sio, L. T. (2008). Group-access control of confidential files in e-commerce management using shared-secret scheme. Electronic Commerce Research, Springer, 2(1–2), 151–158.

  18. Cremers, C. (2009). The Scyther tool: Automatic verification of security protocols. http://www.people.inf.ethz.ch/cremersc/scyther/index.html.

  19. Boneh, D., & Franklin, M. (2001). Identity based encryption from the Weil pairing. Springer Lecture Notes in Computer Science, 2139, 213229.

  20. Zhao, Q., Tong, L., Swami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework. IEEE JSAC, 25(3), 589–600.

    Google Scholar 

  21. Ghasemi, A., & Sousa, E. (2005). Collaborative spectrum sensing for opportunistic access in fading environments. IEEE DySPAN’05, Baltimore, MD, USA.

  22. Ahmed, S., Hossain, M. S., Abdullah, M., & Hossain, M. A. (2012). Cooperative spectrum sensing over Rayleigh fading channel in cognitive radio. International Journal of Electronics and Computer Science Engineering, 1(4), 2583–2592.

    Google Scholar 

  23. Ghasemi, A., & Sousa, (2007). Opportunistic spectrum access in fading channels through collaborative sensing. Journal of Communications, 2(2), 71–82.

    Article  Google Scholar 

  24. Shen, J., Liu, S., Zeng, L., Xie, G., Gao, J., & Liu, Y. (2009). Optimization of cooperative spectrum sensing in cognitive radio network. IET Communications, 3(7), 1170–1178.

    Article  Google Scholar 

  25. Isheden, C., & Fettweis, G. P. (2010). Energy-efficient multi-carrier link adaptation with sum rate-dependent circuit power. IEEE Global Telecommunications Conference (GLOBECOM’10), (pp. 1–6), Miami, FL, USA.

  26. Bloem, M., Alpcan, T. & Basar, T. (2007). A Stackelberg game for power control and channel allocation in cognitive radio networks. Int’l ICST Workshop on Game Theory in Communication Networks (GameComm’07), France.

  27. Myerson, R. (1991). Game theory, analysis and conflict. Cambridge, MA: Harvard University Press.

    Google Scholar 

  28. Apt, G. P., & Witzel, A. (2006). A generic approach to coalition formation. Proceedings of COMSOC’06, Amsterdam, the Netherlands.

  29. Boyd, S., & Vandenberghe, L. (2004). Convex optimization. New York: Cambridge University Press.

    Book  Google Scholar 

  30. Kasiri, B., Cai, J., & Alfa, A. S. (2012). Energy-efficient key management in self-organized multi-channel cognitive radio networks. Technical report, University of Manitoba, Canada.

  31. Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2006). Pairings for cryptographers, IACR Cryptology ePrint Archive.

  32. Recommendation for Key Management. (2011). Special Publication 800–57 Part 1 Rev. 3, NIST.

  33. Cha, J. C., & Cheon, J. H. (2003). An identity-based signature from gap Diffie–Hellman groups. Springer-Verlag Lecture Notes in Computer Science, 2567, 1830.

  34. Cremers, C., Lafourcade, P., & Nadeau, P. (2009). Comparing state spaces in automatic protocol analysis (pp. 70–94). Springer Lecture Notes in Computer Science: Formal to Practical Security.

  35. Cremers, C. (2006). Scyther-Semantics and verification of security protocols. Eindhoven: Eindhoven University of technology Press.

    Google Scholar 

Download references

Acknowledgments

This work is supported by the Natural Sciences and Engineering Research Council (NSERC) of Canada Discovery Grants. In addition, the authors would like to thank Dr. Weiwei Wang for his help throughout this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Behzad Kasiri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kasiri, B., Cai, J. & Alfa, A.S. Securing coalitional game for distributed cooperative spectrum sensing in multi-channel cognitive radio networks. Electron Commer Res 15, 121–146 (2015). https://doi.org/10.1007/s10660-014-9158-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-014-9158-z

Keywords

Navigation