Skip to main content
Log in

An Attack Resilient Framework in Cognitive Radio Network Environment for Inter-domain and Intra-domain Communication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this manuscript, we have considered the number of security concerns at different aspects of network communication in hybrid (centralized or distributed) cognitive radio network cell environment by distributing it into inter-domain and intra-domain. We have identified and resolved the routing and handoff process threats in both the domains by proposing a secure communication framework. The intra-domain security threats include routing and handoff CU attacks that are firmed by a Trust Analyzer which computes the TV/TF of each transmitting node or CU. Further, the inter-domain security mechanism efficiently recognized the malicious behavior of the handoff CU during real time communication by proposing a ticket based mechanism. For this, an authentication server is liable for generating and distributing the tickets to all the handoff users by verifying their authenticity. The proposed framework is validated against conventional security mechanism over certain networking parameters such as network throughput, packet delivery ratio, packet loss ratio, falsification attack, average authentication, maximum authentication and probabilistic scenarios of authentication mechanism for both the domains.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Rabbachin, A., Quek, T. Q., Shin, H., & Win, M. Z. (2011). Cognitive network interference. IEEE Journal on Selected Areas in Communications, 29(2), 480–493.

    Article  Google Scholar 

  2. Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radio more personal. IEEE Personal Communication, 6(4), 13–18.

    Article  Google Scholar 

  3. Jabir, A. J., Shamala, S., Zuriati, Z., & Hamid, N. (2018). A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol. IEEE Systems Journal, 12(1), 1065–1081.

    Article  Google Scholar 

  4. Wang, C. W., & Wang, L. C. (2012). Analysis of reactive spectrum handoff in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(10), 2016–2028.

    Article  Google Scholar 

  5. Gao, R., Ji, X., & Bao, Z. (2018). Secure relay selection of cognitive two-way denoise-and-forward relaying networks. Wireless Personal Communications, 103(4), 2957–2976.

    Article  Google Scholar 

  6. Sharifiand, A. A., & Niya, J. M. (2016). Securing collaborative spectrum sensing against malicious attackers in cognitive radio networks. Wireless Personal Communications, 90(1), 75–91.

    Article  Google Scholar 

  7. Rathee, G., Jaglan, N., Saini, H., Gupta, S. D., & Kanaujia, B. K. (2019). “Probabilistic verification scenarios with reduced authentication delay for handoff clients in mesh networks. Wireless Personal Communications, 104(1–19), 2018.

    Google Scholar 

  8. Val, I., Etxabe, A., Torrego, R., Rodriguez, P. M., Cruces, C., Diez, V., et al. (2019). Design, analysis and implementation of a time-bounded spectrum handoff algorithm for real-time industrial wireless sensor and actuator networks. Journal of Network and Computer Applications, 125, 1–16.

    Article  Google Scholar 

  9. He, Y., Yu, F. R., Wei, Z., & Leung, V. (2019). Trust management for secure cognitive radio vehicular ad hoc networks. Ad Hoc Networks, 86, 154–165.

    Article  Google Scholar 

  10. Salwe, S. S., & Naik, K. K. (2018). Wireless network security based on the image address masking (IAM) mechanism. Wireless Personal Communications, 101(1), 23–40.

    Article  Google Scholar 

  11. Liang, J., Ma, M., Sadiq, M., & Yeung, K. H. (2019). A filter model for intrusion detection system in vehicle ad hoc networks: a hidden Markov methodology. Knowledge-Based Systems, 163, 611–623.

    Article  Google Scholar 

  12. Rathee, G., Saini, H., & Singh, G. (2018). Aspects of trusted routing communication in smart networks. Wireless Personal Communications, 98(2), 2367–2387.

    Article  Google Scholar 

  13. Choi, O. K., & Cho, E. (2019). The mechanism of trust affecting collaboration in virtual teams and the moderating roles of the culture of autonomy and task complexity. Computers in Human Behavior, 91, 305–315.

    Article  Google Scholar 

  14. Dhand, G., & Tyagi, S. (2018). “SMEER: secure multi-tier energy efficient routing protocol for hierarchical wireless sensor networks. Wireless Personal Communications, 105, 1–19.

    Google Scholar 

  15. Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2018). A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3599–3609.

    Article  Google Scholar 

  16. Chen, H., Zhou, M., Xie, L., Wang, K., & Li, J. (2016). Joint spectrum sensing and resource allocation scheme in cognitive radio networks with spectrum sensing data falsification attack. IEEE Transactions on Vehicular Technology, 65(11), 9181–9191.

    Article  Google Scholar 

  17. Althunibat, S., Denise, B., & Granelli, F. (2015). Identification and punishment policies for spectrum sensing data falsification attackers using delivery-based assessment. IEEE Transactions on Vehicular Technology, 65(9), 7308–7321.

    Article  Google Scholar 

  18. Gan, Y., Jiang, C., Beaulieu, N., Wang, J., & Ren, Y. (2016). Secure collaborative spectrum sensing: a peer-prediction method. IEEE Transactions on Communications, 64(10), 4283–4294.

    Google Scholar 

  19. Vosoughi, A., Cavallaro, J. R., & Marshall, A. (2016). Trust-Aware Consensus-Inspired Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks. IEEE Transactions on Cognitive Communications and Networking, 2(1), 24–37.

    Article  Google Scholar 

  20. Liu, Q., Yin, J., Leung, V. C., & Cai, Z. (2013). FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs. IEEE Transactions on Wireless Communications, 12(10), 5124–5137.

    Article  Google Scholar 

  21. Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.

    Article  Google Scholar 

  22. Liu, Y., Dong, M., Ota, K., & Liu, A. (2013). Active trust: secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.

    Article  Google Scholar 

  23. Sharifi, M., Sharifi, A. A., & Niya, M. J. M. (2018). Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach. Wireless Networks, 24(1), 61–68.

    Article  Google Scholar 

  24. Sharef, B., Alsaqour, R., Alawi, M., Abdelhaq, M., & Sundararajan, E. (2018). Robust and trust dynamic mobile gateway selection in heterogeneous VANET-UMTS network. Vehicular Communications, 12, 75–87.

    Article  Google Scholar 

  25. Din, S., Ahmad, A., Paul, A., & Rho, S. (2018). MGR: multi-parameter green reliable communication for internet of things in 5G network. Journal of Parallel and Distributed Computing, 118, 34–45.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geetanjali Rathee.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rathee, G., Jaglan, N. & Kanaujia, B.K. An Attack Resilient Framework in Cognitive Radio Network Environment for Inter-domain and Intra-domain Communication. Wireless Pers Commun 114, 3457–3475 (2020). https://doi.org/10.1007/s11277-020-07541-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07541-6

Keywords

Navigation