Abstract
In this paper, a secure scheme is purposed for coalitional game in multi-channel cognitive radio networks. First, a distributed cooperative attack on multi-channel cooperative spectrum sensing is proposed. In the proposed attack, attackers play two coalitional games to maximize the number of invaded channels in a distributed manner. In the first game, attackers play with their fellow ones to allocate an optimal number of attackers for each channel, while in the second game, they play in the coalitions with other honest cognitive radios so as to conquer as many channels as possible. Then, a hierarchical ID-based key management scheme is proposed, where cognitive radios can only play on a certain number of requested channels and channel access for sensing is limited to the honest cognitive radios selected in the coalitional game. Simulation results show that the proposed attack can considerably decrease the number of potential channels with a low attack cost when security scheme is not considered, in addition to the energy efficiency of the proposed key management scheme. Finally, formal verification of the proposed key management scheme guarantees its immunity and effectiveness.
References
Federal Communications Commission. (2002). Spectrum policy task force report, FCC 02–155.
Zhao, Q., & Sadler, B. M. (2007). A survey of dynamic spectrum access: Signal processing, networking, and regulatory policy. IEEE Signal Processing Magazine, 24, 79–89.
Cabric, D., & Brodersen, S. W. (2005). Implementation issues in spectrum sensing for cognitive radios. The 38th Asilomar Conference on Signals, Systems, and Computers, (pp. 124–130), Pacific Grove, CA, USA.
Urkowitz, H. (1967). Energy detection of unknown deterministic signals. Proceedings of IEEE, 55, 523–231.
Zhang, W., & Letaief, K. (2008). Cooperative spectrum sensing with transmit and relay diversity in cognitive networks. IEEE Transactions on Wireless Communications, 7, 4761–4766.
Wang, W., Kasiri, B., Cai, J., & Alfa, A.S. (2010). Distributed cooperative multi-channel spectrum sensing based on a dynamic coalitional game. IEEE Global Communications Conference (GLOBECOM’10), (pp. 589–600), Miami, FL, USA.
Isaac, J. T., Zeadally, S., & Camara, J. S. (2012). A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs). Electronic Commerce Research, Springer, 12(1), 97–123.
Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: A trust model. Electronic Commerce Research, Springer, 4(4), 359–372.
Chen, R., Park, J. M., & Bian, K. (2008). Robust distributed spectrum sensing in cognitive radio networks. IEEE Int’l Conf. on Computer Commun. (INFOCOM’08), (pp. 1876–1884), Phoenix, AZ, USA.
Rawat, A.S., Anand, P., Hao, C., & Varshney, P.K. (2010). Countering byzantine attacks in cognitive radio networks. 2010 IEEE Int’l Conference on Acoustics Speech and Signal Processing (ICASSP’10), (pp. 3098–3101), Dallas, TX, USA.
Rawat, A. S., Anand, P., Hao, C., & Varshney, P. K. (2011). Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Transactions on Signal Processing, 59(2), 774–786.
He, X., Dai, H., & Ning, P. (2012). A byzantine attack defender: The conditional frequency check. IEEE Int’l Symposium on Information Theory (ISIT’12), (pp. 975–979), Boston, MA, USA.
Du, R., Foo, E., & Boyd, C. (2008). Designing a secure e-tender submission protocol. Electronic Commerce Research, Springer, 8(3), 115–142.
Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Springer Lecture Notes in Computer Science, 196, 4753.
Tan, Z. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Electronic Commerce Research, Springer, 12(4), 505–518.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612.
Tan, E. C., Leong, P. C., & Sio, L. T. (2008). Group-access control of confidential files in e-commerce management using shared-secret scheme. Electronic Commerce Research, Springer, 2(1–2), 151–158.
Cremers, C. (2009). The Scyther tool: Automatic verification of security protocols. http://www.people.inf.ethz.ch/cremersc/scyther/index.html.
Boneh, D., & Franklin, M. (2001). Identity based encryption from the Weil pairing. Springer Lecture Notes in Computer Science, 2139, 213229.
Zhao, Q., Tong, L., Swami, A., & Chen, Y. (2007). Decentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework. IEEE JSAC, 25(3), 589–600.
Ghasemi, A., & Sousa, E. (2005). Collaborative spectrum sensing for opportunistic access in fading environments. IEEE DySPAN’05, Baltimore, MD, USA.
Ahmed, S., Hossain, M. S., Abdullah, M., & Hossain, M. A. (2012). Cooperative spectrum sensing over Rayleigh fading channel in cognitive radio. International Journal of Electronics and Computer Science Engineering, 1(4), 2583–2592.
Ghasemi, A., & Sousa, (2007). Opportunistic spectrum access in fading channels through collaborative sensing. Journal of Communications, 2(2), 71–82.
Shen, J., Liu, S., Zeng, L., Xie, G., Gao, J., & Liu, Y. (2009). Optimization of cooperative spectrum sensing in cognitive radio network. IET Communications, 3(7), 1170–1178.
Isheden, C., & Fettweis, G. P. (2010). Energy-efficient multi-carrier link adaptation with sum rate-dependent circuit power. IEEE Global Telecommunications Conference (GLOBECOM’10), (pp. 1–6), Miami, FL, USA.
Bloem, M., Alpcan, T. & Basar, T. (2007). A Stackelberg game for power control and channel allocation in cognitive radio networks. Int’l ICST Workshop on Game Theory in Communication Networks (GameComm’07), France.
Myerson, R. (1991). Game theory, analysis and conflict. Cambridge, MA: Harvard University Press.
Apt, G. P., & Witzel, A. (2006). A generic approach to coalition formation. Proceedings of COMSOC’06, Amsterdam, the Netherlands.
Boyd, S., & Vandenberghe, L. (2004). Convex optimization. New York: Cambridge University Press.
Kasiri, B., Cai, J., & Alfa, A. S. (2012). Energy-efficient key management in self-organized multi-channel cognitive radio networks. Technical report, University of Manitoba, Canada.
Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2006). Pairings for cryptographers, IACR Cryptology ePrint Archive.
Recommendation for Key Management. (2011). Special Publication 800–57 Part 1 Rev. 3, NIST.
Cha, J. C., & Cheon, J. H. (2003). An identity-based signature from gap Diffie–Hellman groups. Springer-Verlag Lecture Notes in Computer Science, 2567, 1830.
Cremers, C., Lafourcade, P., & Nadeau, P. (2009). Comparing state spaces in automatic protocol analysis (pp. 70–94). Springer Lecture Notes in Computer Science: Formal to Practical Security.
Cremers, C. (2006). Scyther-Semantics and verification of security protocols. Eindhoven: Eindhoven University of technology Press.
Acknowledgments
This work is supported by the Natural Sciences and Engineering Research Council (NSERC) of Canada Discovery Grants. In addition, the authors would like to thank Dr. Weiwei Wang for his help throughout this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kasiri, B., Cai, J. & Alfa, A.S. Securing coalitional game for distributed cooperative spectrum sensing in multi-channel cognitive radio networks. Electron Commer Res 15, 121–146 (2015). https://doi.org/10.1007/s10660-014-9158-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10660-014-9158-z