Skip to main content

Trust-Aware Cooperative Networking

  • Chapter
  • First Online:
Security-aware Cooperation in Cognitive Radio Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

In this chapter, we introduce a trust-aware cooperation scheme to facilitate the cooperation and SU selection in an unfriendly environment, whereby the primary users (PUs) choose trustworthy partners as relays to improve throughput or energy efficiency. Specifically, the cooperation involves a PU selecting the most suitable secondary user (SU) to relay its message and giving the selected SU spectrum access right as a reward, taking the trustworthiness of SUs into consideration. While the SU, being starved for transmission opportunities, chooses a suitable power level for cooperation and its own transmission. The proposed cooperative strategy, including partner selection, time slot allocation and power allocation in an unfriendly environment, are analyzed. Numerical results demonstrate that, with the proposed scheme, the PU can achieve higher throughput or energy saving through cooperation with the trustworthy SU.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. I. Akyildiz, B. Lo, and R. Balakrishnan, “Cooperative spectrum sensing in cognitive radio networks: A survey,” Physical Communication, 2010.

    Google Scholar 

  2. J. Zhang and Q. Zhang, “Stackelberg game for utility-based cooperative cognitiveradio networks,” in Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, 2009.

    Google Scholar 

  3. O. Simeone, I. Stanojev, S. Savazzi, Y. Bar-Ness, U. Spagnolini, and R. Pickholtz, “Spectrum leasing to cooperating secondary ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 203–213, 2008.

    Article  Google Scholar 

  4. N. Zhang, N. Cheng, N. Lu, H. Zhou, J. W. Mark, and X. Shen, “Cooperative cognitive radio networking for opportunistic channel access,” in Proceedings of IEEE GLOBECOM, 2013.

    Google Scholar 

  5. N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, “Cooperative spectrum access towards secure information transfer for crns,” IEEE Journal on Selected Areas in Communications, to appear.

    Google Scholar 

  6. Y. Han, A. Pandharipande, and S. Ting, “Cooperative decode-and-forward relaying for secondary spectrum access,” IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 4945–4950, 2009.

    Article  Google Scholar 

  7. I. Stanojev, O. Simeone, U. Spagnolini, Y. Bar-Ness, and R. Pickholtz, “Cooperative arq via auction-based spectrum leasing,” IEEE Transactions on Communications, vol. 58, no. 6, pp. 1843–1856, 2010.

    Article  Google Scholar 

  8. M. Osborne, “An introduction to game theory,” Oxford University Press, 2003.

    Google Scholar 

  9. A. Boukerche and Y. Ren, “A trust-based security system for ubiquitous and pervasive computing environments,” Computer Communications, vol. 31, no. 18, pp. 4343–4351, 2008.

    Article  Google Scholar 

  10. H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, “A survey of trust and reputation management systems in wireless communications,” Proceedings of the IEEE, vol. 98, no. 10, pp. 1755–1772, 2010.

    Article  Google Scholar 

  11. S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation-based framework for high integrity sensor networks,” ACM Transactions on Sensor Networks (TOSN), vol. 4, no. 3, pp. 1–37, 2008.

    Article  Google Scholar 

  12. A. Jøsang and R. Ismail, “The beta reputation system,” vol. 160, 2002.

    Google Scholar 

  13. Y. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, 2007.

    Article  Google Scholar 

  14. T. Khalaf and S. Kim, “Error probability in multi-source, multi-relay networks under falsified data injection attacks,” pp. 1–4, 2008.

    Google Scholar 

  15. S. Dehnie, H. Senear, and N. Memon, “Detecting malicious behavior in cooperative diversity,” in 41st Annual Conference on Information Sciences and Systems. IEEE, 2007, pp. 895–899.

    Google Scholar 

  16. S. Dehnie and N. Memon, “Detection of misbehavior in cooperative diversity,” in Proceedings of IEEE MILCOM 2008. IEEE, 2008, pp. 1–5.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Zhang, N., Mark, J.W. (2014). Trust-Aware Cooperative Networking. In: Security-aware Cooperation in Cognitive Radio Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0413-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0413-6_3

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0412-9

  • Online ISBN: 978-1-4939-0413-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics