Skip to main content

Advertisement

Log in

Protection Against Defecting Attack and Enhanced Channel Allocation for Video Streaming in CRN

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Arising issue of spectrum scarcity is resolved by emerging cognitive radio technology. In which, unoccupied portion of licensed spectrum would be granted for unlicensed user in order to upgrade the spectrum utilization. Spectrum sensing is an enabling task for labeling the spectrum holes and away from spectrum congestion in cognitive radio networks. Impact of secondary user’s cooperation developed cooperative spectrum sensing for effective spectrum sensing, many secondary users are to be associated in sensing the idle channels. Adversary secondary users (SU) mimic as primary user in cooperative sensing scheme, called primary user emulation attack (PUEA). If any SU forges the sensing data, that is known as spectrum sensing data falsification attack (SSDF). Rescuing the network against these two attacks is the major issue of cognitive radio networks. To address these challenges, we propose cognitive radio network to ensure security in cooperative spectrum sensing for video streaming application. Sensing based clustering algorithm assembles the cognitive radios into clusters to mitigate cooperative overhead and consumed energy. In order to avert PUEA attacks, we introduce authentication signature ID algorithm which provides authority for licensed user to use spectrum. To diminish SSDF attacks, we exploit Hamming algorithm to abolish forgery node from spectrum sensing decision. Furthermore PRN channel allocation algorithm is employed to precisely deliver the video with high quality and lower delay. For video transmission in cognitive radio network, we need to compress the video frames by block truncation coding-pattern fitting in order to reduce bandwidth consumption. This compression technique offers good video transmission with high compression ratio in cognitive radio network, due to trade-off among quality, bit rate and decoding time. Our proposed framework demonstrates the simulation with improved detection rate of idle channel and reduced the delay for high quality video transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Akyildiz, I. F., Lo, B. F., & Balakrishnan, R. (2011). Cooperative spectrum sensing in cognitive radio networks: A survey. Physical Communication, 4, 40–62.

    Article  Google Scholar 

  2. Chandrashekar, S. (2013). Primary user authentication methods for mobile cognitive radio networks. Tucson: The University of Arizona.

    Google Scholar 

  3. Li, S. (2010). Channel allocation for smooth video delivery over cognitive radio networks. Waterloo, Ontario, Canada.

  4. Delp, E., & Mitchell, O. (1979). Image compression using block truncation coding. IEEE Transactions on Communications, 27(9) 1335–1342.

    Article  Google Scholar 

  5. Katre, A. D., & Desai, K. R. (2013). Cooperative spectrum sensing with weighted clustered architecture. International Journal of Scientific Engineering and Research (IJSER), 1(2). doi:www.ijser.in/archives/v1i2/SjIwMTM2.pdf.

  6. Chen, T., Zhang, H., Maggio, G. M., & Chlamtac, I. (2007). CogMesh: A cluster-based cognitive radio network. IEEE.

  7. Kyperountas, S., Correal, N., & Shi, Q. (2010). A comparison of fusion rules for cooperative spectrum sensing in fading channels. In Proceedings of the Wireless Symposium and Summer School , Blacksburg (pp. 2–4).

  8. Das, D., Das, S. (2013). Primary user emulation attack in cognitive radio networks: A survey. IRACST-International Journal of Computer Networks and Wireless Communications, 3(3), 312–318.

    Google Scholar 

  9. Shah, H. A., Usman, M., & Koo, I. (2015). Bioinformatics-inspired quantized hard combination-based abnormality detection for cooperative spectrum sensing in cognitive radio networks. IEEE Sensors Journal, 15(4), 2324–2334.

    Article  Google Scholar 

  10. Huang, X. L., Wang, G., Hu, F., & Kumar, S. (2011). Stability-capacity-adaptive routing for high mobility, multi-hop cognitive radio networks. IEEE Transactions on Vehicle Technology.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chaitanya Duggineni.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Duggineni, C., Chari, K.M. Protection Against Defecting Attack and Enhanced Channel Allocation for Video Streaming in CRN. Wireless Pers Commun 97, 3215–3238 (2017). https://doi.org/10.1007/s11277-017-4671-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4671-8

Keywords

Navigation