Skip to main content
Log in

Real Time Authenticated Spectrum Access and Encrypted Image Transmission via Cloud Enabled Fusion centre

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Spectrum scarcity and the number of mobile users accessing the spectrum are increasing radically, as a complement to this, under utilization of the licensed spectrum also subsist day by day. Hence, in this paper, a solution has been devised to efficiently access the unused spectrum of the licensed user to eradicate the crowded spectrum shortage. A fusion center based authenticated framework has been established to accommodate licensed Primary Users (PUs) and secondary users. The licensed Primary User (PU), updates its information to the Fusion Center (FC1) and the updated information is encrypted and uploaded to the cloud environment. Subsequently, Fusion Center (FC2) communicating with the cloud environment, downloads the PU information. The authenticated secondary users connected with FC2 were given access to the spectrum based on priority and their signal conditioning. This proposed methodology also evades the Primary user emulation attack by adopting encryption algorithms. Further, Confidentiality, Integrity, and Authentication were also guaranteed while accessing the cloud framework. Various communication and security metrices were estimated to validate the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Alhamad, R., & Boujemaa, H. (2020). Cooperative spectrum sensing with energy harvesting. Telecommunication Systems, 74(1), 35–43.

    Article  Google Scholar 

  2. Vyshnavi Jyothi, S., & Shyamala Bharathi, P. (2020). Spectrum sensing based on energy detection for cognitive radio using poission traffic. International Journal of Psychosocial Rehabilitation, 24(5), 2761–2768.

    Article  Google Scholar 

  3. Jayasri, C., & Sakthivel, G. (2020). Spectrum sensing in cognitive radio network using cuckoo search with energy heuristic. Journal of Advanced Research in Dynamical and Control Systems, 12(3 Special Issue), 339–348.

    Google Scholar 

  4. Gul, N., Qureshi, I.M., Khan, M.S., Elahi, A., & Akbar, S. (2020). Differential evolution based reliable cooperative spectrum sensing in the presence of malicious users. Wireless Personal Communications.

  5. Paul, A., Kunarapu, P., Banerjee, A., & Maity, S. P. (2019). Spectrum sensing in cognitive vehicular networks for uniform mobility model. IET Communications, 13(19), 3127–3134.

    Article  Google Scholar 

  6. Li, X., & Zhu, Q. (2019). Game based incentive mechanism for cooperative spectrum sensing with mobile crowd sensors. Wireless Networks, 25(4), 1855–1866.

    Article  MathSciNet  Google Scholar 

  7. Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens—A tri-layer cryptic solution. Computers in Biology and Medicine, 62, 264–276.

    Article  Google Scholar 

  8. Ravichandran, D., Praveenkumar, P., Balaguru Rayappan, J. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170–184.

    Article  Google Scholar 

  9. Ravichandran, D., Praveenkumar, P., Rayappan, J. B. B., & Amirtharajan, R. (2017). DNA chaos blend to secure medical privacy. IEEE Transactions on Nanobioscience, 16, 850–858.

    Article  Google Scholar 

  10. Fu, C., Zhang, G., Bian, O., Lei, W., & Ma, H. (2014). A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One, 9(12), e115773.

    Article  Google Scholar 

  11. Zhang, S., Gao, T., & Gao, L. (2014). A novel encryption frame for medical image with watermark based on hyperchaotic system. Mathematical Problems in Engineering 1–11.

  12. Fu, C., Meng, W., Zhan, Y., Zhu, Z., Lau, F. C. M., Tse, C. K., et al. (2013). An efficient and secure medical image protection scheme based on chaotic maps. Computers in Biology and Medicine, 43(8), 1000–1010.

    Article  Google Scholar 

  13. Li, X., Wang, L., Yan, Y., & Liu, P. (2016). An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems. Optik - International Journal for Light and Electron Optics, 127(5), 2558–2565.

    Article  Google Scholar 

  14. Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., et al. (2017). Fusion of confusion and diffusion: a novel image encryption approach. Telecommunication Systems, 65, 65–78.

    Article  Google Scholar 

  15. Manimegalai, M., & Bhagyaveni, M. A. (2019). A method to enhance the throughput of cognitive radio network using Kullback Leibler divergence with optimised sensing time (KLDOST). Wireless Personal Communications, 109(3), 1645–1660.

    Article  Google Scholar 

  16. Revathy, K., Thenmozhi, K., Amirtharajan, R., & Praveenkumar, P. (2018). CR assisted IE guarded authenticated biomedical image transactions. IEEE Photonics Journal, 10(5), 1–13.

    Article  Google Scholar 

  17. Praveenkumar, P., Catherine Priya, P., Avila, J., et al. (2017). Tamper proofing identification and authenticated DICOM image transmission using wireless channels and CR network. Wireless Personal Communications, 97(4), 5573–5595.

    Article  Google Scholar 

  18. Subbulakshmi, P., Prakash, M., & Ramalakshmi, V. (2018). Honest auction based spectrum assignment and exploiting spectrum sensing data falsification attack using stochastic game theory in wireless cognitive radio network. Wireless Personal Communications, 102(2), 799–816.

    Article  Google Scholar 

  19. Na, W., Yoon, J., Cho, S., Griffith, D., & Golmie, N. (2018). Centralized cooperative directional spectrum sensing for cognitive radio networks. IEEE Transactions on Mobile Computing, 17(6), 1260–1274.

    Article  Google Scholar 

  20. Alhamad, R., Wang, H., & Yao, Y.-D. (2017). Cooperative spectrum sensing with random access reporting channels in cognitive radio networks. IEEE Transactions on Vehicular Technology, 66(8), 7249–7261.

    Article  Google Scholar 

  21. Khanikar, K., Sinha, R., & Bhattacharjee, R. (2017). Incorporating primary user interference for enhanced spectrum sensing. IEEE Signal Processing Letters, 24(7), 1039–1043.

    Article  Google Scholar 

  22. Deepthi, P. P., & Sathidevi, P. S. (2009). Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. Computers & Security, 28(3–4), 229–241.

    Article  Google Scholar 

  23. Yang, Y., Chen, F., Zhang, X., Yu, J., & Zhang, P. (2017). Research on the hash function structures and its application. Wireless Personal Communications, 94(4), 2969–2985.

    Article  Google Scholar 

  24. Zhang, P., Zhang, X., & Yu, J. (2017). A parallel hash function with variable initial values. Wireless Personal Communications, 96(2), 2289–2303.

    Article  Google Scholar 

  25. Senthil Kumar, R., & Geetha, B. G. (2018). Signature verification and bloom hashing technique for efficient cloud data storage. Wireless Personal Communications, 103(4), 3079–3097.

    Article  Google Scholar 

  26. Hamza, R., Muhammad, K., Kumar, A., & Ramirez-Gonzalez, G. (2017). Hash based encryption for key frames of diagnostic hysteroscopy. IEEE Access, 6, 60160–60170.

    Article  Google Scholar 

Download references

Acknowledgements

The authors wish to acknowledge Science and Engineering Research Board (SERB) gratefully, Department of Science and Technology (DST), India (EEQ/2019/000565) for providing the financial support to carry out this research work. Also, the authors wish to provide their gratitude to SASTRA Deemed to be University, Thanjavur, India, for providing infrastructural support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Padmapriya Praveenkumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Padmapriya, V.M., Thenmozhi, K., Avila, J. et al. Real Time Authenticated Spectrum Access and Encrypted Image Transmission via Cloud Enabled Fusion centre. Wireless Pers Commun 115, 2127–2148 (2020). https://doi.org/10.1007/s11277-020-07674-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07674-8

Keywords

Navigation