A Secure Spectrum Handoff Mechanism in Cognitive Radio Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rathee G. | - |
dc.contributor.author | Jaglan N. | - |
dc.contributor.author | Garg S. | - |
dc.contributor.author | Choi B.J. | - |
dc.contributor.author | Choo K.R. | - |
dc.date.available | 2020-09-14T08:05:28Z | - |
dc.date.created | 2020-03-18 | - |
dc.date.issued | 2020-09 | - |
dc.identifier.issn | 2332-7731 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/38646 | - |
dc.description.abstract | The need for more efficient spectrum utilization is becoming more pronounced in our increasingly digitalized society. However, this also introduces a variety of new security threats. In this paper, we introduce a novel cognitive user emulation attack (CUEA) in a cognitive radio network (CRN), which can be exploited by intruders during spectrum handoff. Then, we propose a secure handoff mechanism that can successfully counter such an attack by introducing a coordinating cognitive user that computes the level of trust of each cognitive user based on its behavioral characteristics. Malicious users can be effectively identified by the coordinating cognitive user by looking up the trust values. The performance of the proposed mechanism is validated using MATLAB simulations. The simulation results show that the utility of the proposed mechanism in terms of its probability in correctly identifying false authentication, detection rate, throughput rate, and transmission delay. IEEE | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.relation.isPartOf | IEEE Transactions on Cognitive Communications and Networking | - |
dc.title | A Secure Spectrum Handoff Mechanism in Cognitive Radio Networks | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/TCCN.2020.2971703 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | IEEE Transactions on Cognitive Communications and Networking, v.6, no.3, pp.959 - 969 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000568659500008 | - |
dc.identifier.scopusid | 2-s2.0-85079442637 | - |
dc.citation.endPage | 969 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 959 | - |
dc.citation.title | IEEE Transactions on Cognitive Communications and Networking | - |
dc.citation.volume | 6 | - |
dc.contributor.affiliatedAuthor | Choi B.J. | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | cognitive radio network | - |
dc.subject.keywordAuthor | cognitive user emulation attack | - |
dc.subject.keywordAuthor | false authentication | - |
dc.subject.keywordAuthor | spectrum handoff security | - |
dc.subject.keywordAuthor | trust value. | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordPlus | MATLAB | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Radio | - |
dc.subject.keywordPlus | Radio systems | - |
dc.subject.keywordPlus | Secure communication | - |
dc.subject.keywordPlus | Behavioral characteristics | - |
dc.subject.keywordPlus | Cognitive radio network | - |
dc.subject.keywordPlus | Cognitive radio network (CRN) | - |
dc.subject.keywordPlus | cognitive user emulation attack | - |
dc.subject.keywordPlus | Spectrum handoffs | - |
dc.subject.keywordPlus | Spectrum utilization | - |
dc.subject.keywordPlus | Transmission delays | - |
dc.subject.keywordPlus | Trust values | - |
dc.subject.keywordPlus | Cognitive radio | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.