Trust-Aware Cooperative Networking

  • Ning Zhang
  • Jon W. Mark
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


In this chapter, we introduce a trust-aware cooperation scheme to facilitate the cooperation and SU selection in an unfriendly environment, whereby the primary users (PUs) choose trustworthy partners as relays to improve throughput or energy efficiency. Specifically, the cooperation involves a PU selecting the most suitable secondary user (SU) to relay its message and giving the selected SU spectrum access right as a reward, taking the trustworthiness of SUs into consideration. While the SU, being starved for transmission opportunities, chooses a suitable power level for cooperation and its own transmission. The proposed cooperative strategy, including partner selection, time slot allocation and power allocation in an unfriendly environment, are analyzed. Numerical results demonstrate that, with the proposed scheme, the PU can achieve higher throughput or energy saving through cooperation with the trustworthy SU.


  1. 31.
    I. Akyildiz, B. Lo, and R. Balakrishnan, “Cooperative spectrum sensing in cognitive radio networks: A survey,” Physical Communication, 2010.Google Scholar
  2. 35.
    J. Zhang and Q. Zhang, “Stackelberg game for utility-based cooperative cognitiveradio networks,” in Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, 2009.Google Scholar
  3. 36.
    O. Simeone, I. Stanojev, S. Savazzi, Y. Bar-Ness, U. Spagnolini, and R. Pickholtz, “Spectrum leasing to cooperating secondary ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 203–213, 2008.CrossRefGoogle Scholar
  4. 37.
    N. Zhang, N. Cheng, N. Lu, H. Zhou, J. W. Mark, and X. Shen, “Cooperative cognitive radio networking for opportunistic channel access,” in Proceedings of IEEE GLOBECOM, 2013.Google Scholar
  5. 48.
    N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, “Cooperative spectrum access towards secure information transfer for crns,” IEEE Journal on Selected Areas in Communications, to appear.Google Scholar
  6. 51.
    Y. Han, A. Pandharipande, and S. Ting, “Cooperative decode-and-forward relaying for secondary spectrum access,” IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 4945–4950, 2009.CrossRefGoogle Scholar
  7. 54.
    I. Stanojev, O. Simeone, U. Spagnolini, Y. Bar-Ness, and R. Pickholtz, “Cooperative arq via auction-based spectrum leasing,” IEEE Transactions on Communications, vol. 58, no. 6, pp. 1843–1856, 2010.CrossRefGoogle Scholar
  8. 79.
    M. Osborne, “An introduction to game theory,” Oxford University Press, 2003.Google Scholar
  9. 80.
    A. Boukerche and Y. Ren, “A trust-based security system for ubiquitous and pervasive computing environments,” Computer Communications, vol. 31, no. 18, pp. 4343–4351, 2008.CrossRefGoogle Scholar
  10. 81.
    H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, “A survey of trust and reputation management systems in wireless communications,” Proceedings of the IEEE, vol. 98, no. 10, pp. 1755–1772, 2010.CrossRefGoogle Scholar
  11. 82.
    S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation-based framework for high integrity sensor networks,” ACM Transactions on Sensor Networks (TOSN), vol. 4, no. 3, pp. 1–37, 2008.CrossRefGoogle Scholar
  12. 83.
    A. Jøsang and R. Ismail, “The beta reputation system,” vol. 160, 2002.Google Scholar
  13. 84.
    Y. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, 2007.CrossRefGoogle Scholar
  14. 85.
    T. Khalaf and S. Kim, “Error probability in multi-source, multi-relay networks under falsified data injection attacks,” pp. 1–4, 2008.Google Scholar
  15. 86.
    S. Dehnie, H. Senear, and N. Memon, “Detecting malicious behavior in cooperative diversity,” in 41st Annual Conference on Information Sciences and Systems. IEEE, 2007, pp. 895–899.Google Scholar
  16. 87.
    S. Dehnie and N. Memon, “Detection of misbehavior in cooperative diversity,” in Proceedings of IEEE MILCOM 2008. IEEE, 2008, pp. 1–5.Google Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Ning Zhang
    • 1
  • Jon W. Mark
    • 1
  1. 1.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada

Personalised recommendations