Abstract
In this chapter, we introduce a trust-aware cooperation scheme to facilitate the cooperation and SU selection in an unfriendly environment, whereby the primary users (PUs) choose trustworthy partners as relays to improve throughput or energy efficiency. Specifically, the cooperation involves a PU selecting the most suitable secondary user (SU) to relay its message and giving the selected SU spectrum access right as a reward, taking the trustworthiness of SUs into consideration. While the SU, being starved for transmission opportunities, chooses a suitable power level for cooperation and its own transmission. The proposed cooperative strategy, including partner selection, time slot allocation and power allocation in an unfriendly environment, are analyzed. Numerical results demonstrate that, with the proposed scheme, the PU can achieve higher throughput or energy saving through cooperation with the trustworthy SU.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
I. Akyildiz, B. Lo, and R. Balakrishnan, “Cooperative spectrum sensing in cognitive radio networks: A survey,” Physical Communication, 2010.
J. Zhang and Q. Zhang, “Stackelberg game for utility-based cooperative cognitiveradio networks,” in Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, 2009.
O. Simeone, I. Stanojev, S. Savazzi, Y. Bar-Ness, U. Spagnolini, and R. Pickholtz, “Spectrum leasing to cooperating secondary ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 203–213, 2008.
N. Zhang, N. Cheng, N. Lu, H. Zhou, J. W. Mark, and X. Shen, “Cooperative cognitive radio networking for opportunistic channel access,” in Proceedings of IEEE GLOBECOM, 2013.
N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, “Cooperative spectrum access towards secure information transfer for crns,” IEEE Journal on Selected Areas in Communications, to appear.
Y. Han, A. Pandharipande, and S. Ting, “Cooperative decode-and-forward relaying for secondary spectrum access,” IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 4945–4950, 2009.
I. Stanojev, O. Simeone, U. Spagnolini, Y. Bar-Ness, and R. Pickholtz, “Cooperative arq via auction-based spectrum leasing,” IEEE Transactions on Communications, vol. 58, no. 6, pp. 1843–1856, 2010.
M. Osborne, “An introduction to game theory,” Oxford University Press, 2003.
A. Boukerche and Y. Ren, “A trust-based security system for ubiquitous and pervasive computing environments,” Computer Communications, vol. 31, no. 18, pp. 4343–4351, 2008.
H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, “A survey of trust and reputation management systems in wireless communications,” Proceedings of the IEEE, vol. 98, no. 10, pp. 1755–1772, 2010.
S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation-based framework for high integrity sensor networks,” ACM Transactions on Sensor Networks (TOSN), vol. 4, no. 3, pp. 1–37, 2008.
A. Jøsang and R. Ismail, “The beta reputation system,” vol. 160, 2002.
Y. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, 2007.
T. Khalaf and S. Kim, “Error probability in multi-source, multi-relay networks under falsified data injection attacks,” pp. 1–4, 2008.
S. Dehnie, H. Senear, and N. Memon, “Detecting malicious behavior in cooperative diversity,” in 41st Annual Conference on Information Sciences and Systems. IEEE, 2007, pp. 895–899.
S. Dehnie and N. Memon, “Detection of misbehavior in cooperative diversity,” in Proceedings of IEEE MILCOM 2008. IEEE, 2008, pp. 1–5.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Zhang, N., Mark, J.W. (2014). Trust-Aware Cooperative Networking. In: Security-aware Cooperation in Cognitive Radio Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0413-6_3
Download citation
DOI: https://doi.org/10.1007/978-1-4939-0413-6_3
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-0412-9
Online ISBN: 978-1-4939-0413-6
eBook Packages: Computer ScienceComputer Science (R0)