A Trust-Based Technique for Secure Spectrum Access in Cognitive Radio Networks

  • Sumit Kar
  • Srinivas Sethi
  • Ramesh Kumar Sahoo
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 710)


Cognitive radio networks (CRNs) are becoming an important part of wireless communications, which can improve the utilization of the limited and scarce spectrum resources. However, the flexibility and the unique characteristics of CRN make it vulnerable to varied types of attack. Moreover, security is a key requirement at every step of its functionality (spectrum sensing, spectrum analysis, spectrum decision and spectrum act). Numerous researches have mainly focused on to provide security at the cognition capability (spectrum sensing, spectrum analysis and spectrum decision) of CRN for detecting the appropriate spectrum holes. However, after obtaining access to the spectrum hole (Spectrum Act), a Cognitive Radio (CR) may behave maliciously to achieve own benefits or for some other reasons. Such maliciousness can severely affect the normal activities of the whole network. Therefore, there is a need to track and record the behaviour during the spectrum access of a CR user, which can encourage the CR users to obey the opportunistic spectrum access policy. In this paper, we construct a trust-based approach for secure spectrum access in CRN. The CR nodes trust value is determined from its past activities, and based on which, it is decided whether the CR node will get access the primary users free spectrum or not.


Cognitive radio networks Trust Secure spectrum access Malicious node detection 


  1. 1.
    Force, S.P.T.: Spectrum policy task force report. Technical Report 02-135, Federal Communications Commission (2002)Google Scholar
  2. 2.
    Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 23 (2005) 201–220Google Scholar
  3. 3.
    Bansal, T., Chen, B., Sinha, P.: Fastprobe: Malicious user detection in cognitive radio networks through active transmissions. In: IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada (2014) 2517–2525Google Scholar
  4. 4.
    Wang, W., Chen, L., Shin, K.G., Duan, L.: Secure cooperative spectrum sensing and access against intelligent malicious behaviors. In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014. (2014) 1267–1275Google Scholar
  5. 5.
    Attar, A., Tang, H., Vasilakos, A.V., Yu, F.R., Leung, V.C.M.: A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE 100 (2012) 3172–3186Google Scholar
  6. 6.
    Fragkiadakis, A.G., Tragos, E.Z., Askoxylakis, I.G.: A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys and Tutorials 15 (2013) 428–445Google Scholar
  7. 7.
    Kar, S., Sethi, S., Bhuyan, M.K.: Security challenges in cognitive radio network and defending against byzantine attack: a survey. IJCNDS 17 (2016) 120–146Google Scholar
  8. 8.
    Ishmanov, F., Kim, S.W., Nam, S.Y.: A secure trust establishment scheme for wireless sensor networks. Sensors 14 (2014) 1877–1897Google Scholar
  9. 9.
    Ishmanov, F., Kim, S.W., Nam, S.Y.: A robust trust establishment scheme for wireless sensor networks. Sensors 15 (2015) 7040–7061Google Scholar
  10. 10.
    Govindan, K., Mohapatra, P.: Trust computations and trust dynamics in mobile ad-hoc networks: A survey. IEEE Communications Surveys and Tutorials 14 (2012) 279–298Google Scholar
  11. 11.
    Pei, Q., Yuan, B., Li, L., Li, H.: A sensing and etiquette reputation-based trust management for centralized cognitive radio networks. Neurocomputing 101 (2013) 129–138Google Scholar
  12. 12.
    Parvin, S., Hussain, F.K., Hussain, O.K.: Conjoint trust assessment for secure communication in cognitive radio networks. Mathematical and Computer Modelling 58 (2013) 1340–1350Google Scholar
  13. 13.
    Pei, Q., Li, Z., Ma, L.: A trust value-based spectrum allocation algorithm in CWSNs. IJDSN 9 (2013)Google Scholar
  14. 14.
    Parvin, S., Han, S., Tian, B., Hussain, F.K.: Trust-based authentication for secure communication in cognitive radio networks. In: IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing. (2010) 589–596Google Scholar
  15. 15.
    Chen, K.C., Peng, Y.J., Prasad, N., Liang, Y.C., Sun, S.: Cognitive radio network architecture: Part I—General structure. In: Proceedings of the 2nd international conference on ubiquitous information management and communication, ACM (2008) 114–119Google Scholar
  16. 16.
    Chen, R., Park, J.M., Hou, Y., J.H. Reed: Toward secure distributed spectrum sensing in cognitive radio networks. Communications Magazine, IEEE 46 (2008) 50–55Google Scholar
  17. 17.
    He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: Retrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Information Technology in Biomedicine 16 (2012) 623–632Google Scholar
  18. 18.
    Kar, S., Sethi, S., Sahoo, R.K.: A multi-factor trust management scheme for secure spectrum sensing in cognitive radio networks. Wireless Personal Communications 97 (2017) 2523–2540Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Sumit Kar
    • 1
  • Srinivas Sethi
    • 1
  • Ramesh Kumar Sahoo
    • 1
  1. 1.Department of Computer Science Engineering and ApplicationIGITSarangIndia

Personalised recommendations