Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks

Journal of Network and Computer Applications - Tập 72 - Trang 140-149 - 2016
Jingyu Feng1,2, Guangyue Lu1, Honggang Wang1, Xuanhong Wang1
1Department of Communication Engineering, Xi'an University of Posts and Telecommunications, Xian 710121, China
2State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

Tài liệu tham khảo

Akyildiz, 2009, CRAHNs, Ad Hoc Netw., 7, 810, 10.1016/j.adhoc.2009.01.001 Akyildiz, 2011, Cooperative spectrum sensing in cognitive radio networks, Phys. Commun., 4, 40, 10.1016/j.phycom.2010.12.003 Boukerche, A., Ren, Y., Pazzi, R., 2009. An adaptive computational trust model for mobile ad hoc networks. In: Proceedings of the 5th International Conference on Wireless Communications and Mobile Computing, pp. 191–195. Cha, J.C., Cheon, J.H., 2003. An identity-based signature from gap Diffie–Hellman groups. In: Proceeding of 6th International Workshop on Practice and Theory in Public Key Cryptography, pp. 18–30. Chen, 2008, Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Commun. Magaz., 46, 50, 10.1109/MCOM.2008.4481340 Fang, 2016, BTRES, J. Netw. Comput. Appl., 59, 88, 10.1016/j.jnca.2015.06.013 Federal Communications Commission, 2002. Spectrum policy task force. 〈http://transition.fcc.gov/sptf/files/0801fcc.pdf〉 (accessed 15.08.09). Feng, 2015, Behave well, KSII Trans. Int. Inf. Syst., 9, 1321 Gamma function. 〈http://www.en.wikipedia.org/wiki/Gamma_function〉(accessed 15.10.11). IEEE Standard 1609.2 – IEEE Trial-Use Standard for Wireless Access in Vehicular Environments – Security Services for Applications and Management Messages, 2006. Jiang, Y.X., Shi, M.H., Shen, X.M., et al., 2009. BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wirel. Commun. 8 (4), 1974–1983. Jonsson J., Kaliski B, 2003. Public-key Cryptography Standards ♯1: RSA Cryptography Specifications Version 2.1. Technical Report RFC 3447. 〈http://wattle.apnic.net/ietf/rfc/PDF/rfc5208.pdf〉(accessed 15.09.15). Jøsang, A., Ismail, R., 2002. The beta reputation system. In: Proceeding of the 15th Bled Electronic Commence Conference. pp. 1–14. Le The Dung, Beongku An, 2015. How do forwarding schemes influence the multi-hop connectivity in cognitive radio ad-hoc networks? In: Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, pp. 805–807. Morid, 2012, An enhanced e-commerce trust model for community based centralized systems, Electron. Commer. Res., 12, 409, 10.1007/s10660-012-9099-3 Peh, 2009, Optimization of cooperative sensing in cognitive radio networks, IEEE Trans. Veh. Tech., 58, 5294, 10.1109/TVT.2009.2028030 Pei, 2013, A sensing and etiquette reputation-based trust management for centralized cognitive radio networks, Neurocomputing, 101, 129, 10.1016/j.neucom.2012.08.005 Qin, 2009, Towards a trust-aware cognitive radio architecture, ACM SIGMOBILE Mob. Comput. Commun. Rev., 13, 86, 10.1145/1621076.1621085 Rif-Pous, 2011, Review of robust cooperative spectrum sensing techniques for cognitive radio networks, Wirel. Person. Commun., 67, 175, 10.1007/s11277-011-0372-x Shamir, A., Identity-based cryptography. 〈http://en.wikipedia.org/wiki/ID-based_cryptography〉 (accessed 15.08.21). Wang, 2015, A trust-based probabilistic recommendation model for social networks, J. Netw. Comput. Appl., 55, 59, 10.1016/j.jnca.2015.04.007 Yan, 2014, A survey on trust management for Internet of Things, J. Netw. Comput. Appl., 42, 120, 10.1016/j.jnca.2014.01.014 Zeng, 2014, Mitigating spectrum sensing data falsification attacks in hard-decision combining cooperative spectrum sensing, Sci. China, 57, 1 Zhu, H.J., Lin, X.D., Lu, R.X., et al., 2010. An opportunistic batch bundle authentication scheme for energy constrained DTNs. In: Proceedings of IEEE INFOCOM Conference, pp. 1–9.