DocumentCode :
1818251
Title :
Secure and trusted algorithm for cognitive radio network
Author :
Dubey, Rajni ; Sharma, Sanjeev ; Chouhan, Lokesh
Author_Institution :
SOIT Rajiv Gandhi Proudhyogiki Vshwavidyalya, Bhopal, India
fYear :
2012
fDate :
20-22 Sept. 2012
Firstpage :
1
Lastpage :
7
Abstract :
Wireless spectrum is precious, so there are always requirements of dynamic shared spectrum techniques and an intelligent wireless communication system, such as Cognitive Radio Network (CRN). Although, CRN provides awareness, reliability, adaptability, high quality services and flexibility to its users but it has also opens the door for lots of threats and attacks. In this paper, various possible attacks and threats along with the possible solutions are discussed. This article has also proposed a trust based security algorithm enabling cognitive radio to access the distributed computation, storage, and resources available in cognitive radio environment. Proposed trust based algorithm is based on the location awareness and distance between the mobile user. Trust is calculated from the actual received power and trust metrics are determined by combining the requirements of the trustworthiness and the QoS of the links with the route. In this algorithm, three dimensional (3D) coordinates system is used to verify the location of the primary user and malicious user. Proposed algorithm has defined the trust factor of various users on the basis of trustworthiness. The simulation results have demonstrated the effectiveness of the proposed trust algorithm for all three types of user i.e. primary, secondary and malicious user, in the terms of both security and performance.
Keywords :
cognitive radio; mobility management (mobile radio); quality of service; radio spectrum management; resource allocation; telecommunication network reliability; telecommunication security; trusted computing; 3D coordinates system; CRN; QoS; adaptability; cognitive radio network; distributed resource access; distributed storage access; dynamic shared spectrum techniques; intelligent wireless communication system; location awareness; malicious user; mobile user; network attacks; network threats; primary user; reliability; secondary user; three dimensional coordinates system; trust factor; trust metrics; trust-based security algorithm; trustworthiness requirements; wireless spectrum; Authentication; Cognitive radio; Routing; Sensors; Signal to noise ratio; Trustworthiness; cognitive radio network; malicious user; primary user;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless and Optical Communications Networks (WOCN), 2012 Ninth International Conference on
Conference_Location :
Indore
ISSN :
2151-7681
Print_ISBN :
978-1-4673-1988-1
Type :
conf
DOI :
10.1109/WOCN.2012.6331887
Filename :
6331887
Link To Document :
بازگشت