Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks

Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Cognitive radios (CRs), which are capable of sensing its surrounding environment and adapting its internal parameters, have been considered in mobile ad hoc networks (MANETs). The area of security in CR-MANETs has received far less attention than other areas. However, some distinct characteristics of CRs introduce new non-trivial security risks to CR-MANETs. In this article, the authors study spectrum sensing data falsification (SSDF) attacks to CR-MANETs, in which intruders send false local spectrum sensing results in cooperative spectrum sensing, and it will result in wrong spectrum sensing decisions by CRs. The authors present a novel bio-inspired consensus-based cooperative spectrum sensing scheme to counter SSDF attacks in CR-MANETs. Their scheme is based on recent advances in consensus algorithms that have taken inspiration from self-organising behaviour of animal groups such as birds, fish, ants, honeybees and others. Unlike the existing schemes, there is no need for a common receiver to do the data fusion for reaching the final decision to counter SSDF attacks. The scheme has self-configuration and self-maintenance capabilities. Moreover, in order to further improve the security of CR-MANETs, the authors present an authentication scheme using identity (ID)-based cryptography with threshold secret sharing. Simulation results are presented to show the effectiveness of the proposed schemes.

References

    1. 1)
      • Ghasemi, A., Sousa, E.: `Collaborative spectrum sensing for opportunistic access in fading environments', Proc. IEEE DySPAN 2005, November 2005, Baltimore, MD.
    2. 2)
    3. 3)
    4. 4)
      • Shamir, A.: `Identity based cryptosystems and signature schemes', Proc. CRYPTO'84, August 1984.
    5. 5)
    6. 6)
      • Cabric, D., Mishra, S., Brodersen, R.: `Implementation issues in spectrum sensing for cognitive radios', Proc. 38th Asilomar Conf. on Signals, Systems and Computers, 2004, 1, p. 772–776.
    7. 7)
    8. 8)
    9. 9)
      • Ren, W., Beard, R., Atkins, E.: `A survey of consensus problems in multi-agent coordination', Proc. American Control Conf.'05, June 2005, Portland, OR.
    10. 10)
      • Hoeper, K., Gong, G.: `Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation', Technical Report, 2006.
    11. 11)
    12. 12)
    13. 13)
    14. 14)
      • P. Whittle . Multi-armed bandits and the Gittins index. J. R. Stat. Soc. B , 2 , 143 - 149
    15. 15)
    16. 16)
    17. 17)
      • Xiao, L., Boyd, S., Lall, S.: `A scheme for robust distributed sensor fusion based on average consensus', Proc. Fourth Int. Symp. on Information Processing in Sensor Networks IPSN 2005, 2005, p. 63–70.
    18. 18)
    19. 19)
    20. 20)
      • Z. Li , F.R. Yu , M. Huang . A distributed consensus-based cooperative spectrum sensing in cognitive radios. IEEE Trans. Veh. Technol. , 383 - 393
    21. 21)
      • Desmedt, Y., Frankel, Y.: `Threshold cryptosystems', Proc. CRYPTO'89, August 1989.
    22. 22)
    23. 23)
      • F.R. Yu . (2011) Cognitive radio mobile ad hoc networks.
    24. 24)
      • Saxena, N., Tsudik, G., Yi, J.H.: `Identity-based access control for ad hoc groups', Proc. Int. Conf. Information Security and Cryptology, December 2004.
    25. 25)
    26. 26)
      • Deng, H., Mukherjee, A., Agrawal, D.: `Threshold and identity-based key management and authentication for wireless ad hoc networks', Proc. Int. Conf. Information Technology: Coding and Computing (ITCC'04), 2004.
    27. 27)
      • Li, Z., Yu, F.R., Huang, M.: `A cooperative spectrum sensing consensus scheme in cognitive radios', Proc. IEEE Infocom'09, April 2009, Rio de Janeiro, Brazil.
    28. 28)
    29. 29)
      • F. Dressler , Ö.B. Akan , A. Ngom . Guest editorial – special issue on biological and biologically-inspired communication. Springer Trans. Comput. Syst. Biol. (TCSB)
    30. 30)
    31. 31)
    32. 32)
    33. 33)
      • V. Krishnamurthy . A value iteration algorithm for partially observed Markov decision process multi-armed bandits. Math. Oper. Res. , 2 , 133 - 152
    34. 34)
      • Kostylev, V.: `Energy detection of a signal with random amplitude', IEEE Proc. ICC'02, April 2002, New York, NY.
    35. 35)
    36. 36)
    37. 37)
      • Yi, S., Kravets, R.: `Moca: mobile certificate authority for wireless ad hoc networks', Proc. Second Annual PKI Research Workshop, April 2003, Gaithersburg, MD.
    38. 38)
      • Sun, C., Zhang, W., Letaief, K.B.: `Cluster-based cooperative spectrum sensing in cognitive radio systems', Proc. IEEE ICC'07, June 2007, Glasgow, UK, p. 2511–2515.
    39. 39)
      • Huang, M., Manton, J.: `Stochastic consensus seeking with measurement noise: convergence and asymptotic normality', Proc. American Control Conf.'08, June 2008, Seattle, WA.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2010.0553
Loading

Related content

content/journals/10.1049/iet-com.2010.0553
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address