Computer Science ›› 2018, Vol. 45 ›› Issue (10): 166-171.doi: 10.11896/j.issn.1002-137X.2018.10.031

• Information Security • Previous Articles     Next Articles

Spectrum-aware Secure Opportunistic Routing Protocol in Cognitive Radio Networks

WANG Lu1,2, BAI Guang-wei1, SHEN Hang1,3, WANG Tian-jing1   

  1. College of Computer Science and Technology,Nanjing Tech University,Nanjing 211816,China 1
    State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,China 2
    National Engineering Research Center for Communication and Network Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,China 3
  • Received:2017-09-11 Online:2018-11-05 Published:2018-11-05

Abstract: This paper proposed a spectrum-aware secure opportunistic routing (S2OR) protocol against the dynamic characteristics of spectrum and the potential selective forwarding attack in cognitive radio networks.During the spectrum sensing phase,the availability probability of link among cognitive nodes is analyzed by modeling primary user activity.During the routing selection phase,a trust management model is exploited to examine node’s reliability for packet forwarding,so as to select relay nodes with high trustability and ensure the integrity of data transmission.With the local information,a comprehensive routing metric called the expected throughput,consisting of link availability probability,link quality and node’s trustability,is computed.On this basis,cognitive nodes can opportunistically select candidate forwarding nodes and the corresponding data channels.Simulation results demonstrate that S2OR can well adapt to the dynamics of spectrum,result in higher throughput and reduce the impacts of malicious attacks at the same time.

Key words: Cognitive radio, Opportunistic routing, Spectrum sensing, Trust management

CLC Number: 

  • TP393
[1]AKYILDIZ I F,LEE W Y,CHOWDHURY K R.CRAHNs:Cognitive radio ad hoc networks[J].Ad Hoc Networks,2009,7(5):810-836.
[2]YOUSSEF M,IBRAHIM M,ABDELATIF M,et al.Routing metrics of cognitive radio networks:A survey[J].IEEE Communications Surveys & Tutorials,2014,16(1):92-109.
[3]CESANA M,CUOMO F,EKICI E.Routing in cognitive radio networks:Challenges and solutions[J].Ad Hoc Networks,2011,9(3):228-248.
[4]LIU Y,CAI L X,SHEN X S.Spectrum-aware opportunistic routing in multi-hop cognitive radio networks[J].IEEE Journal on Selected Areas in Communications,2012,30(10):1958-1968.
[5]WEI Z,TANG H,YU F R.A trust based framework for both spectrum sensing and data transmission in CR-MANETs[C]∥IEEE International Conference on Communication Workshop.IEEE,2015:562-567.
[6]DING L,SAVAS O,AHN G S,et al.Securing cognitive radio networks with distributed trust management against belief manipulation attacks[C]∥IEEE GLOBECOM Workshops.IEEE,2015:1-6.
[7]WANG L,WANG Q,ZHANG H.Secure routing algorithm based on trust value for Ad Hoc networks[C]∥International Conference on Computer Engineering,Information Science & Application Technology.2016.
[8]LIN S C,CHEN K C.Spectrum Aware Opportunistic Routing in Cognitive Radio Networks[C]∥Global Telecommunications Conference.IEEE,2010:1-6.
[9]PAN X,JIANG L,HE C.Spectrum aware multi-channel opportunistic routing in cognitive radio sensor networks[C]∥International Conference on Computational and Information Sciences.IEEE Computer Society,2013:1558-1561.
[10]KHASAWNEH M,AGARWAL A.A secure routing algorithm based on nodes behavior during spectrum sensing in cognitive radio networks[C]∥IEEE,International Performance Computing and Communications Conference.IEEE Computer Society,2016:1-8.
[11]ZHANG G,CHEN Z,TIAN L,et al.Using trust to establish a secure routing model in cognitive radio network[J].Plos One,2015,10(9):e0139326.
[12]CUI C,MAN H,WANG Y,et al.Optimal cooperative spectrum aware opportunistic routing in cognitive radio Ad Hoc networks[J].Wireless Personal Communications,2016,91(1):101-118.
[13]AKYILDIZ I F,LO B F,BALAKRISHNAN R.Cooperative spectrum sensing in cognitive radio networks:A survey[J].Physical Communication,2011,4(1):40-62.
[14]REN J,ZHANG Y,ZHANG N,et al.Dynamic channel access to improve energy efficiency in cognitive radio sensor networks[J].IEEE Transactions on Wireless Communications,2016,15(5):3143-3156.
[15]DROMARD J,KHATOUN R,KHOUKHI L.A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network[C]∥International Conference on Te-lecommunications.IEEE,2013:1-5.
[16]MARCHANG N,DATTA R.Light-weight trust-based routing protocol for mobile ad hoc networks[J].Iet Information Security,2012,6(2):77-83.
[17]YADAV R,MANE A.LASAR:Spectrum aware routing protocol for cognitive radio wireless networks[C]∥International Conference on Communication,Information & Computing Technology.IEEE,2015:1-6.
[1] TIAN Miao-miao, WANG Zu-lin, XU Mai. DVB-S2 Signal Receiving and Analysis Based on Cognitive Radio [J]. Computer Science, 2020, 47(4): 226-232.
[2] SU Fan-jun,DU Ke-yi. Trust Based Energy Efficient Opportunistic Routing Algorithm in Wireless Sensor Networks [J]. Computer Science, 2020, 47(2): 300-305.
[3] XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149.
[4] WANG Chen-yang, LIN Hui. Three-dimensional Geographic Opportunistic Routing Based on Energy Harvesting Wireless Sensor Networks [J]. Computer Science, 2019, 46(6A): 305-308.
[5] ZHANG Yu-pei, ZHAO Zhi-jin, ZHENG Shi-lian. Cognitive Decision Engine of Hybrid Learning Differential Evolution and Particle Swarm Optimization [J]. Computer Science, 2019, 46(6): 95-101.
[6] JI Yi, JIA Jun-cheng, SHENG Kai. Time Slot Optimization for Channel Hopping in CRN [J]. Computer Science, 2019, 46(11): 58-64.
[7] ZHAO Peng, WU Li-fa, HONG Zheng. Research on Broker Based Multicloud Access Control Model [J]. Computer Science, 2019, 46(11): 123-129.
[8] GAO Peng, LIU Yun-jiang, GAO Wei-ting, LI Man, CHEN Juan. Double Thresholds DMM Cooperative Spectrum Sensing Algorithm Based on Credibility [J]. Computer Science, 2018, 45(9): 166-170.
[9] CAO Kai-tian, HANG Yi-ling. Novel Energy Detection Method and Detection Performance Analysis [J]. Computer Science, 2018, 45(6A): 266-269.
[10] ZHUANG Ling and YIN Yao-hu. Resource Allocation Algorithm for Cognitive Heterogeneous Networks Based on Imperfect Spectrum Sensing [J]. Computer Science, 2018, 45(5): 49-53.
[11] HAN Li and QIAN Huan-yan. Opportunistic Routing Algorithm Combining Intra-session Coding and Inter-session Coding in Wireless Network [J]. Computer Science, 2018, 45(5): 69-74.
[12] XU Wen-hao, SHEN Hang and BAI Guang-wei. Link Burstiness-aware Opportunistic Routing Protocol in Wireless Networks [J]. Computer Science, 2018, 45(5): 83-88.
[13] GAO Bao-jian, WANG Shao-di, REN Yu-hui, WANG Yu-jie. Modulation Protection Algorithm Based on Wireless OFDM Systems [J]. Computer Science, 2018, 45(10): 64-68.
[14] ZHANG Yang, ZHAO Hang-sheng and ZHAO Xiao-long. Energy-efficient Design under Imperfect Condition Based on Spectrum Prediction [J]. Computer Science, 2017, 44(Z6): 258-262.
[15] YIN Xin-qi, WU Jun, MO Wei-wei and BAI Guang-wei. Improved Opportunistic Routing Algorithm Based on Node Trustworthiness for WMNs [J]. Computer Science, 2017, 44(8): 151-156.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .