Abstract
The attention of the researchers has highly turned towards the Cognitive Radio Networks (CRN) due to its high efficiency and throughput performance. In comparison with the conventional radio environment, the Cognitive Radio (CR) has numerous security threats as it is flexible together with functions on the wireless network. Attributable to the inherent nature of the technology, the security susceptibility in CR technology, therefore, it is vital to guarantee system security in CRN. So, this paper proposes an optimal Neural Network (NN) model explicitly Brownian movement based Harris Hawks Optimization for Elman Neural Network (BMHHO-ENN) for attaining a secure CRN. Additionally, this paper also proposes Secure Hash Algorithm 2-Rivest Shamir Adlemans (SHA2-RSA) to render safe data communication. Initially, the Amplitudes Modulations signal of PU is deemed as an input. Then, the energy together with Cyclo Stationary features of the inputted signal are extracted utilizing the mathematical model. Aimed at Attack Detection (AD), the extracted features are fed to the proposed BMHHO-ENN. BMHHO-ENN classifies the inputted signal into ‘4’ disparate sorts of attack, and if the signal is not attacked by the intruder, it renders the classification outcomes as “normal”. Lastly, if it is not attacked, then the SHA2-RSA algorithm encrypts that classified normal data and stores it in the cloud for the receiver-side data access to render security. The proposed methods’ outcomes are examined as well as contrasted with the other prevailing methods to show the proposed work’s efficiency for AD along with the data’s security.
Similar content being viewed by others
Data availability
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
Abbreviations
- CRN:
-
Cognitive radio networks
- CR:
-
Cognitive radio
- NN:
-
Neural network
- SHA2-RSA:
-
Secure Hash Algorithm 2-Rivest Shamir Adlemans
- AM:
-
Amplitudes modulations
- CS:
-
Cyclo stationary
- AD:
-
Attack detection
- HHO:
-
Harris Hawk Optimization
- MAC:
-
Medium access control
- BM:
-
Brownian movement
- WC:
-
Wireless communication
- SS:
-
Spectrum sensing
- GABC:
-
Genetics artificial bee colonies
- SDR:
-
Software-defined radio
- SSM:
-
Spectrum sensing model
- CSS:
-
Cooperative spectrums sensing
- SSDF:
-
Spectrum sensing data falsification
References
Ahmadfard A, Jamshidi A (2019) A channel hopping based defense method against primary user emulation attack in cognitive radio networks. Comput Commun 148:1–8. https://doi.org/10.1016/j.comcom.2019.09.003
Ahmadfard A, Jamshidi A, Keshavarz-Haddad A (2017) Probabilistic spectrum sensing data falsification attack in cognitive radio networks. Signal Process 137:1–9. https://doi.org/10.1016/j.sigpro.2017.01.0330165-1684
Bouabdellah M, Kaabouch N, El Bouanani F, Ben-Azza H (2018) Network layer attacks and countermeasures in cognitive radio networks: a survey. J Inf Secur Appl 38(40–49):2018. https://doi.org/10.1016/j.jisa.2017.11.010
Elangovan K, Subashini S (2018) Particle bee optimized convolution neural network for managing security using cross-layer design in cognitive radio network. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1007-9
Elghamrawy MS (2020) Security in cognitive radio network: defense against primary user emulation attacks using genetic artificial bee colony (GABC) algorithm. Futur Gener Comput Syst 109:479–487
Fang H, Li X, Choo K-K (2017b) Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Appl Math Comput 296:153–167
Fang H, Li X, Li J, Choo K-K (2017a) An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks. Comput Commun 105:124–132. https://doi.org/10.1016/j.comcom.2016.11.012
Fathy, M., Tammam, A., Saafan, A. : Mitigating the impact of malicious behavior via utilizing multiple routes in a cooperative sensing cognitive radio network. In: IEEE 15th Student Conference on Research and Development (SCOReD), pp. 247–252 (2017)
Feng J, Li S, Lv S, Wang H, Anmin Fu (2018) Securing cooperative spectrum sensing against collusive false feedback attack in cognitive radio networks. IEEE Trans Veh Technol 67(9):8276–8287
Ghaznavi M, Jamshidi A (2019) A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks. Comput Commun 138:106–114
Jararweh Y, Bany HA, Salameh AA, Tawalbeh L, Song H (2018) Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks. Telecommun Syst 67(2):217–229
Ling MH, Yau K-L, Qadir J, Poh GS, Ni Q (2015) Application of reinforcement learning for security enhancement in cognitive radio networks. Appl Soft Comput 37:809–829
Mahmoudi M, Faez K, Ghasemi A (2019) Uncoordinated frequency hopping scheme for defense against primary user emulation attack in cognitive radio networks. Comput Netw 163:106884. https://doi.org/10.1016/j.comnet.2019.106884
Manesh MR, Kaabouch N (2018) Security threats and countermeasures of MAC layer in cognitive radio networks. Ad Hoc Netw 70(85–102):2018. https://doi.org/10.1016/j.adhoc.2017.11.003
Marchang N, Taggu A, Patra AK (2018) Detecting byzantine attack in cognitive radio networks by exploiting frequency and ordering properties. IEEE Trans Cogn Commun Netw 4(4):816–824
Mneimneh S, Bhunia S, Vázquez-Abad F, Sengupta S (2017) A game-theoretic and stochastic survivability mechanism against induced attacks in cognitive radio networks. Pervasive Mob Comput 40:577–592
Morozov, Y., Perfilov, M.O.Y., Malyavina, N.V., Teryokhin, R.V., Chernova I.V.: Combined approach to SSDF-attacks mitigation in cognitive radio networks. In: Systems of Signals Generating and Processing in the Field of on Board Communications, pp. 1–4. IEEE (2020)
Neelaveni R, Sridevi B (2019) A novel Neyman–Pearson criterion-based adaptive neuro-fuzzy inference system (NPC-ANFIS) model for security threats detection in cognitive radio networks. Soft Comput 23(18):8389–8397
Patnaik VM, Kamakoti VM, Řchák V (2019) PROLEMus: a proactive learning-based MAC protocol against PUEA and SSDF attacks in energy constrained cognitive radio networks. IEEE Trans Cogn Commun Netw 5(2):400–412. https://doi.org/10.1109/TCCN.2019.2913397
Ponnusamy V, Kottursamy K, Karthick T, Mukeshkrishnan MB, Malathi D, Ahanger TA (2020) Primary user emulation attack mitigation using neural network. Comput Electric Eng 88:106849
Rathee G, Jaglan N, Kanaujia BK (2020) An attack resilient framework in cognitive radio network environment for inter-domain and intra-domain communication. Wireless Pers Commun 114:3457. https://doi.org/10.1007/s11277-020-07541-6
Saad W, Shokair M, Ibraheem SM (2019) On the security of relay assisted cognitive radio networks in the presence of primary transceiver network. Wireless Pers Commun 104(3):949–977
Sajid A, Khalid B, Ali M, Mumtaz S, Masud U, Qamar F (2020) Securing cognitive radio networks using blockchains. Future Gener Comput Syst 108:816–826
Song J, Zhong Qi, Wang W, Chunhua Su, Tan Z, Liu Y (2020) FPDP flexible privacy-preserving data publishing scheme for smart agriculture. IEEE Sens J (Early Access). https://doi.org/10.1109/JSEN.2020.3017695
Soto J, Nogueira M (2015) A framework for resilient and secure spectrum sensing on cognitive radio networks. Comput Netw 79:313–322
Wang W, Huang H, Zhang L, Chunhua Su (2020) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw Appl. https://doi.org/10.1007/s12083-020-01020-2
Zhang M, Wang L, Feng Y (2018) Distributed cooperative spectrum sensing based on reinforcement learning in cognitive radio networks. AEU-Int J Electron Commun 94:359–366
Acknowledgements
We thank the anonymous referees for their useful suggestions.
Funding
This work has no funding resource.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by KJPV, SS. The first draft of the manuscript was written by KJPV and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent of publication
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Venkatesan, K.J.P., Shanmughavel, S. Attack detection and securer data transmission in cognitive radio networks using BMHHO-ENN and SHA2-RSA. Soft Comput 26, 175–187 (2022). https://doi.org/10.1007/s00500-021-06462-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-06462-1