Skip to main content

Advertisement

Log in

Attack detection and securer data transmission in cognitive radio networks using BMHHO-ENN and SHA2-RSA

  • Foundation, algebraic, and analytical methods in soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The attention of the researchers has highly turned towards the Cognitive Radio Networks (CRN) due to its high efficiency and throughput performance. In comparison with the conventional radio environment, the Cognitive Radio (CR) has numerous security threats as it is flexible together with functions on the wireless network. Attributable to the inherent nature of the technology, the security susceptibility in CR technology, therefore, it is vital to guarantee system security in CRN. So, this paper proposes an optimal Neural Network (NN) model explicitly Brownian movement based Harris Hawks Optimization for Elman Neural Network (BMHHO-ENN) for attaining a secure CRN. Additionally, this paper also proposes Secure Hash Algorithm 2-Rivest Shamir Adlemans (SHA2-RSA) to render safe data communication. Initially, the Amplitudes Modulations signal of PU is deemed as an input. Then, the energy together with Cyclo Stationary features of the inputted signal are extracted utilizing the mathematical model. Aimed at Attack Detection (AD), the extracted features are fed to the proposed BMHHO-ENN. BMHHO-ENN classifies the inputted signal into ‘4’ disparate sorts of attack, and if the signal is not attacked by the intruder, it renders the classification outcomes as “normal”. Lastly, if it is not attacked, then the SHA2-RSA algorithm encrypts that classified normal data and stores it in the cloud for the receiver-side data access to render security. The proposed methods’ outcomes are examined as well as contrasted with the other prevailing methods to show the proposed work’s efficiency for AD along with the data’s security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

Abbreviations

CRN:

Cognitive radio networks

CR:

Cognitive radio

NN:

Neural network

SHA2-RSA:

Secure Hash Algorithm 2-Rivest Shamir Adlemans

AM:

Amplitudes modulations

CS:

Cyclo stationary

AD:

Attack detection

HHO:

Harris Hawk Optimization

MAC:

Medium access control

BM:

Brownian movement

WC:

Wireless communication

SS:

Spectrum sensing

GABC:

Genetics artificial bee colonies

SDR:

Software-defined radio

SSM:

Spectrum sensing model

CSS:

Cooperative spectrums sensing

SSDF:

Spectrum sensing data falsification

References

  • Ahmadfard A, Jamshidi A (2019) A channel hopping based defense method against primary user emulation attack in cognitive radio networks. Comput Commun 148:1–8. https://doi.org/10.1016/j.comcom.2019.09.003

    Article  Google Scholar 

  • Ahmadfard A, Jamshidi A, Keshavarz-Haddad A (2017) Probabilistic spectrum sensing data falsification attack in cognitive radio networks. Signal Process 137:1–9. https://doi.org/10.1016/j.sigpro.2017.01.0330165-1684

    Article  Google Scholar 

  • Bouabdellah M, Kaabouch N, El Bouanani F, Ben-Azza H (2018) Network layer attacks and countermeasures in cognitive radio networks: a survey. J Inf Secur Appl 38(40–49):2018. https://doi.org/10.1016/j.jisa.2017.11.010

    Article  Google Scholar 

  • Elangovan K, Subashini S (2018) Particle bee optimized convolution neural network for managing security using cross-layer design in cognitive radio network. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1007-9

    Article  Google Scholar 

  • Elghamrawy MS (2020) Security in cognitive radio network: defense against primary user emulation attacks using genetic artificial bee colony (GABC) algorithm. Futur Gener Comput Syst 109:479–487

    Article  Google Scholar 

  • Fang H, Li X, Choo K-K (2017b) Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Appl Math Comput 296:153–167

    MathSciNet  MATH  Google Scholar 

  • Fang H, Li X, Li J, Choo K-K (2017a) An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks. Comput Commun 105:124–132. https://doi.org/10.1016/j.comcom.2016.11.012

    Article  Google Scholar 

  • Fathy, M., Tammam, A., Saafan, A. : Mitigating the impact of malicious behavior via utilizing multiple routes in a cooperative sensing cognitive radio network. In: IEEE 15th Student Conference on Research and Development (SCOReD), pp. 247–252 (2017)

  • Feng J, Li S, Lv S, Wang H, Anmin Fu (2018) Securing cooperative spectrum sensing against collusive false feedback attack in cognitive radio networks. IEEE Trans Veh Technol 67(9):8276–8287

    Article  Google Scholar 

  • Ghaznavi M, Jamshidi A (2019) A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks. Comput Commun 138:106–114

    Article  Google Scholar 

  • Jararweh Y, Bany HA, Salameh AA, Tawalbeh L, Song H (2018) Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks. Telecommun Syst 67(2):217–229

    Article  Google Scholar 

  • Ling MH, Yau K-L, Qadir J, Poh GS, Ni Q (2015) Application of reinforcement learning for security enhancement in cognitive radio networks. Appl Soft Comput 37:809–829

    Article  Google Scholar 

  • Mahmoudi M, Faez K, Ghasemi A (2019) Uncoordinated frequency hopping scheme for defense against primary user emulation attack in cognitive radio networks. Comput Netw 163:106884. https://doi.org/10.1016/j.comnet.2019.106884

    Article  Google Scholar 

  • Manesh MR, Kaabouch N (2018) Security threats and countermeasures of MAC layer in cognitive radio networks. Ad Hoc Netw 70(85–102):2018. https://doi.org/10.1016/j.adhoc.2017.11.003

    Article  Google Scholar 

  • Marchang N, Taggu A, Patra AK (2018) Detecting byzantine attack in cognitive radio networks by exploiting frequency and ordering properties. IEEE Trans Cogn Commun Netw 4(4):816–824

    Article  Google Scholar 

  • Mneimneh S, Bhunia S, Vázquez-Abad F, Sengupta S (2017) A game-theoretic and stochastic survivability mechanism against induced attacks in cognitive radio networks. Pervasive Mob Comput 40:577–592

    Article  Google Scholar 

  • Morozov, Y., Perfilov, M.O.Y., Malyavina, N.V., Teryokhin, R.V., Chernova I.V.: Combined approach to SSDF-attacks mitigation in cognitive radio networks. In: Systems of Signals Generating and Processing in the Field of on Board Communications, pp. 1–4. IEEE (2020)

  • Neelaveni R, Sridevi B (2019) A novel Neyman–Pearson criterion-based adaptive neuro-fuzzy inference system (NPC-ANFIS) model for security threats detection in cognitive radio networks. Soft Comput 23(18):8389–8397

    Article  Google Scholar 

  • Patnaik VM, Kamakoti VM, Řchák V (2019) PROLEMus: a proactive learning-based MAC protocol against PUEA and SSDF attacks in energy constrained cognitive radio networks. IEEE Trans Cogn Commun Netw 5(2):400–412. https://doi.org/10.1109/TCCN.2019.2913397

    Article  Google Scholar 

  • Ponnusamy V, Kottursamy K, Karthick T, Mukeshkrishnan MB, Malathi D, Ahanger TA (2020) Primary user emulation attack mitigation using neural network. Comput Electric Eng 88:106849

    Article  Google Scholar 

  • Rathee G, Jaglan N, Kanaujia BK (2020) An attack resilient framework in cognitive radio network environment for inter-domain and intra-domain communication. Wireless Pers Commun 114:3457. https://doi.org/10.1007/s11277-020-07541-6

    Article  Google Scholar 

  • Saad W, Shokair M, Ibraheem SM (2019) On the security of relay assisted cognitive radio networks in the presence of primary transceiver network. Wireless Pers Commun 104(3):949–977

    Article  Google Scholar 

  • Sajid A, Khalid B, Ali M, Mumtaz S, Masud U, Qamar F (2020) Securing cognitive radio networks using blockchains. Future Gener Comput Syst 108:816–826

    Article  Google Scholar 

  • Song J, Zhong Qi, Wang W, Chunhua Su, Tan Z, Liu Y (2020) FPDP flexible privacy-preserving data publishing scheme for smart agriculture. IEEE Sens J (Early Access). https://doi.org/10.1109/JSEN.2020.3017695

    Article  Google Scholar 

  • Soto J, Nogueira M (2015) A framework for resilient and secure spectrum sensing on cognitive radio networks. Comput Netw 79:313–322

    Article  Google Scholar 

  • Wang W, Huang H, Zhang L, Chunhua Su (2020) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw Appl. https://doi.org/10.1007/s12083-020-01020-2

    Article  Google Scholar 

  • Zhang M, Wang L, Feng Y (2018) Distributed cooperative spectrum sensing based on reinforcement learning in cognitive radio networks. AEU-Int J Electron Commun 94:359–366

    Article  Google Scholar 

Download references

Acknowledgements

We thank the anonymous referees for their useful suggestions.

Funding

This work has no funding resource.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by KJPV, SS. The first draft of the manuscript was written by KJPV and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to K. J. Prasanna Venkatesan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent of publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Venkatesan, K.J.P., Shanmughavel, S. Attack detection and securer data transmission in cognitive radio networks using BMHHO-ENN and SHA2-RSA. Soft Comput 26, 175–187 (2022). https://doi.org/10.1007/s00500-021-06462-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-06462-1

Keywords

Navigation