Skip to main content
Log in

A Lightweight Secure Throughput Optimization Scheme in Cognitive Radio Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cognitive radio (CR) is a technological invention to improve the spectrum performance in wireless networks linked to a cooperative spectrum sensing strategy. This performance, however, can be degraded by adversary secondary nodes which intentionally aim to falsify the decisions on the presence of primary nodes. The purpose of this paper is to model and investigate the impact of adversary secondary nodes in the context of cooperative spectrum sensing in CRs in terms of false alarms and missed detection probabilities. The impact of these probabilities is then included analytically in the throughput formula accordingly, under the assumption of adopting Slotted-ALOHA protocol by the secondary nodes. Then an intrusion detection system is proposed with the goal to maximize the network throughput with adversary secondary users. Simulations are carried out to test the validation of the proposed method and to evaluate the achieved results with the well-known decision rules.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data Availability

The manuscript has no associated data.

References

  1. Mitola, J., & Maguire, G. Q. (1999). Cognitive radio: Making software radios more personal. IEEE personal communications, 6(4), 13–18.

    Article  Google Scholar 

  2. Pandit, S., & Singh, G. (2017). Spectrum sharing in cognitive radio networks. Springer.

    Book  Google Scholar 

  3. Matin, M. A. (2017). Spectrum Access and Management for Cognitive Radio Networks. Springer.

    Book  Google Scholar 

  4. Chkirbene, Z., & Hamdi, N. (2015). A survey on spectrum management in cognitive radio networks. International Journal of Wireless and Mobile Computing, 8(2), 153–165.

    Article  Google Scholar 

  5. Wang, B., & Liu, K. R. (2010). Advances in cognitive radio networks: A survey. IEEE Journal of selected topics in signal processing, 5(1), 5–23.

    Article  MathSciNet  Google Scholar 

  6. Benmammar, B., Amraoui, A., & Krief, F. (2013). A survey on dynamic spectrum access techniques in cognitive radio networks. International Journal of Communication Networks and Information Security (IJCNIS), 5(2), 68–79.

    Google Scholar 

  7. Noorshams, N., Malboubi, M., Bahai, A. (2010). Centralized and decentralized cooperative spectrum sensing in cognitive radio networks: A novel approach. In 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2010, pp. 1–5.

  8. Lee, W.-Y., & Akyildiz, I. F. (2011). Spectrum-aware mobility management in cognitive radio cellular networks. IEEE Transactions on Mobile Computing, 11(4), 529–542.

    Google Scholar 

  9. Miao, L., Di, Xu., Huo, Z.-M., & Sun, Z.-X. (2022). Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things. Telecommunication Systems, 80(2), 227–238.

    Article  Google Scholar 

  10. Nair, P. R., Vinod, A. P., & Krishna, A. K. (2011). A fast two stage detector for spectrum sensing in cognitive radios. IEEE Vehicular Technology Conference (VTC Fall), 2011, 1–5.

    Google Scholar 

  11. Zeng, Y., Zhang, M., Han, F., Gong, Yi., & Zhang, J. (2019). Spectrum analysis and convolutional neural network for automatic modulation recognition. IEEE Wireless Communications Letters, 8(3), 929–932.

    Article  Google Scholar 

  12. Prashob, R. N., Vinod, A., & Krishna, A. K. (2010). An adaptive threshold based energy detector for spectrum sensing in cognitive radios at low SNR. IEEE International Conference on Communication Systems, 2010, 574–578.

    Google Scholar 

  13. Hillenbrand, J., Weiss, T. A., & Jondral, F. K. (2005). Calculation of detection and false alarm probabilities in spectrum pooling systems. IEEE Communications letters, 9(4), 349–351.

    Article  Google Scholar 

  14. Ganesan, G., & Li, Y. (2007). Cooperative spectrum sensing in cognitive radio, part II: Multiuser networks. IEEE Transactions on wireless communications, 6(6), 2214–2222.

    Article  Google Scholar 

  15. Cabric, D., Mishra, S. M., & Brodersen, R. W. (2004). Implementation issues in spectrum sensing for cognitive radios. Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 1, 772–776.

    Article  Google Scholar 

  16. Kam, M., Zhu, Q., & Gray, W. S. (1992). Optimal data fusion of correlated local decisions in multiple sensor detection systems. IEEE Transactions on Aerospace and Electronic Systems, 28(3), 916–920.

    Article  Google Scholar 

  17. Shekhawat, G.K., & Yadav, R.P. (2021). Review on classical to deep spectrum sensing in cognitive radio networks. In 2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 11–15. IEEE.

  18. Abbass, N., Hassan, H. A. H., Chaaya, J. A., Mansour, A., & Yao, K. C. (2021). Spectrum sensing for cognitive radio: Recent advances and future challenge. Sensors, 21(7), 2408.

    Article  Google Scholar 

  19. Haldorai, A., & Kandaswamy, U. (2019). Cooperative spectrum handovers in cognitive radio networks. In A. Haldorai & U. Kandaswamy (Eds.), Intelligent spectrum handovers in cognitive radio networks (pp. 1–18). Springer International Publishing.

    Google Scholar 

  20. Kumar, A., & Kumar, K. (2020). Multiple access schemes for cognitive radio networks: A survey. Physical Communication, 38, 100953.

    Article  Google Scholar 

  21. Akyildiz, I. F., Lee, W.-Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks, 50(13), 2127–2159.

    Article  MATH  Google Scholar 

  22. Alam, S., & Mallick, S. (2021). Analysis of throughput in narrowband cognitive radio networks over fading channels: A collaborative spectrum sensing approach.

  23. Lundén, J., Koivunen, V., Huttunen, A., Poor, H.V. (2007). Spectrum sensing in cognitive radios based on multiple cyclic frequencies. In 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007, pp. 37–43.

  24. Ibe, O. C. (2017). Fundamentals of Data Communication Networks. UK: Wiley.

    Book  Google Scholar 

  25. Fragkiadakis, A. G., Tragos, E. Z., & Askoxylakis, I. G. (2012). A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys & Tutorials, 15(1), 428–445.

    Article  Google Scholar 

  26. Mao, H., & Zhu, L. (2011). An investigation on security of cognitive radio networks. International Conference on Management and Service Science, 2011, 1–4.

    Google Scholar 

  27. Safdar, G.A., & O’Neill, M. (2009). Common control channel security framework for cognitive radio networks. In VTC Spring 2009-IEEE 69th Vehicular Technology Conference, 2009, pp. 1–5.

  28. Salahdine, F., & Kaabouch, N. (2020). Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey. Physical Communication, 39, 101001.

    Article  Google Scholar 

Download references

Funding

This manuscript has been funded partially by research offices at the University of Kurdistan and the University of Halabja.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Fathi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals perorated by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tofiq, A.K.H., Fathi, M. & Ahmed, F.W. A Lightweight Secure Throughput Optimization Scheme in Cognitive Radio Networks. Wireless Pers Commun 132, 245–259 (2023). https://doi.org/10.1007/s11277-023-10609-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10609-8

Keywords

Navigation