Abstract
Cognitive radio (CR) is one of the promising technologies for better utilization of radio spectrum. The parameters like operating frequency, transmission power, type of modulation etc., extend a major contribution in CR. These parameters helps to transmit the information in communication environment. The CR monitors their own performance and subsequently reads the radio outputs in radio frequency environment in an effective manner. During the process of this cognitive communication, security is one of the major issues owing to the factors such as anomalous spectrum usage, hindrance in the identification of primary and secondary spectrum users. This paper introduces Cross-Layer Design Based Particle Bee optimized Convolution Neural Network (CLPBCNN) for managing the security issues present in the cognitive radio networks. Initially, user’s spectrum has been sensed based on the energy level with cyclostationary process which helps to analyze the primary user related radio features. Along with the extracted user features, authentication is handled by symmetric triple data encryption algorithm and the features are trained by proposed network which examines the intermediate attacks and malicious activities. Furthermore, an efficient multi-path energy routing protocol is proposed to monitor the neighboring nodes and spectrum usage for detecting the attacks in CR. This process is repeated continuously for creating the effective attack free cognitive radio based wireless communication system. Then the excellence of the system is evaluated and validated with the help of NS2 simulation tool and the efficiency is analyzed in terms of miss detection probability, route dis-connectivity ratio, and detection delay. The effective utilization of this cyclostationary and routing process leads to overall improved performance.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-018-1007-9/MediaObjects/12652_2018_1007_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-018-1007-9/MediaObjects/12652_2018_1007_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-018-1007-9/MediaObjects/12652_2018_1007_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-018-1007-9/MediaObjects/12652_2018_1007_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-018-1007-9/MediaObjects/12652_2018_1007_Fig5_HTML.png)
Similar content being viewed by others
References
Bakhtiari M, Nateghizad M, Zainal A (2013) Secure search over encrypted data in cloud computing. In: International conference on advanced computer science applications and technologies (ACSAT), 23–24, pp 290–295
Blesa J, Romero E, Rozas A Araujo A (2013) PUE attack detection in CWSNs using anomaly detection techniques. EURASIP J Wirel Commun Netw 1:1–13
Brik V, Banerjee S, Gruteser M, Oh S (2008) Wireless device identification with radiometric signatures. In: ACM international conference on Mobile computing and networking, pp 116–127
Brown TX, Sethi A (2007) Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: a multi-dimensional analysis and assessment. In: cognitive radio oriented wireless networks and communications, 2007
Chang G-Y, Wang S-Y, Liu Y-X (2017) A jamming-resistant channel hopping scheme for cognitive radio networks. IEEE Trans Wirel Commun 16(10):6712–6725
Chen R, Park JM, Reed JH (2007) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Select Areas Commun 26(1)
Chen R, Park J-M, Reed J (2008) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Select Areas Commun IEEE 26(1):25
Chen Z, Cooklev T, Chen C, Raez CP (2009) Modeling primary user emulation attacks and defenses in cognitive radio networks. In: International performance computing and communications conference, IEEE, Scottsdale, AZ pp 208–215
Ejaz W (2008) Spectrum sensing in cognitive radio networks. Computer Engineering, National University of Sciences and Technology, Pakistan
Elangovan K, Subashini S (2016) A survey of security issues in cognitive radio network. ARPN J Eng Appl Sci 11(17):10496–10500
Gai K, Qiu M, Ming Z, Zhao H Qiu L (2017) Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans Smart Grid 8(5):2431–2439
Ganesan D, Govindan R, Shenker S, Estrin D (2001) Energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mob Comput Commun Rev 5(4):11–25
Grissa M, Yavuz AA, Hamdaoui B (2017a) Location privacy preservation in database-driven wireless cognitive networks through encrypted probabilistic data structures. IEEE Trans Cogn Commun Netw 3(2):255–226
Grissa M, Hamdaoui B, Yavuza AA (2017b) Location privacy in cognitive radio networks: a survey. IEEE Commun Surv Tutor 19(3):1726–1760
Jadhav S (2011) Modular neural network based arrhythmia classification system using ECG signal data. IEEE EMBS conference on biomedical engineering and sciences (IECBES)
Jadhav S, Nalbalwar SL, Ghatol A (2010) Artificial Neural Network based cardiac arrhythmia classification using ECG signal data. In: International conference on electronics and information engineering (ICEIE), in IEEE
Khasawneh M, Agarwal A (2017) A secure and efficient authentication mechanism applied to cognitive radio networks. IEEE Access 5:15597–15608
Kotobi K, Bilen SG (2018) Secure blockchains for dynamic spectrum access: a decentralized database in moving cognitive radio networks enhances security and user access. IEEE Veh Technol Mag 13(1):32–39
Ng DWK, Lo ES, Schober R (2016) Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer. IEEE Trans Veh Technol 65(5):3166–3184
Le TN, Chin W-L, Chen H-H (2017) Standardization and security for smart grid communications based on cognitive radio technologies—a comprehensive survey. IEEE Commun Surv Tutor 19:423–445
Li D, Qn Y, Liu Z, Wu X, Zhang Z (2014) Mixed signal detection based on second-order cyclostationary features. In: IEEE military communications conference, Baltimore, MD, pp 682–687
Lin H, Hu J, Ma J, Xu L, Yu Z (2017) A secure collaborative spectrum sensing strategy in cyber-physical systems. IEEE Access 5:27679–27690
Liu Y, Zheng YF (2005) One-against-all multi-class SVM classification using reliability measures. IEEE Int Jt Conf Neural Netw 2:849–854
Muthulakshmi S, Latha K (2012) Classification of ECG waveform using feature selection algorithm. In: IEEE international conference on advanced communication control and computing technologies (ICACCCT)
Nguyen V-D, Duong TQ, Shin O-S, Nallanathan A, Karagiannidis GK (2017) Enhancing PHY security of cooperative cognitive radio multicast communications. IEEE Trans Cogn Commun Netw 3(4):599–613
Parvin S, Hussain FK (2011) Digital signature-based secure communication in cognitive radio networks. In: Broadband and wireless computing, communication and applications in IEEE
Parvin S, Han S, Tian B, Hussain FK (2010) Trust-based authentication for secure communication in cognitive radio networks. In: IEEE/IFIP 8th international conference on embedded and ubiquitous computing (EUC)
Parvin S, Hussain FK, Hussain OK (2013) Conjoint trust assessment for secure communication in cognitive radio networks. Math Comput Model 58(5–6):1340–1350
Qian L, Li X, Wei S (2013) Cross-layer detection of stealthy jammers in multihop cognitive radio networks. In: International conference on computing, networking and communications (ICNC), IEEE, San Diego, CA, pp 1026–1030
Ramani V, Sharma SK (2017) Cognitive radios: a survey on spectrum sensing, security and spectrum handoff. China Commun 14(11):185–208
Saghiri AM, Vahdati M, Gholizadeh K, Meybodi MR, Dehghan M, Rashidi H (2018) A framework for cognitive internet of things based on blockchain. In: 2018 4th International conference on web research (ICWR), IEEE, pp 138–143
Salameh HAB, Almajali S, Ayyash M, Elgala H (2018) Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet Things J 5(3):1904–1913
Sanyal S, Bhadauria R, Ghosh C (2009) Secure communication in cognitive radio networks. In: 4th International conference on computers and devices for communication, CODEC 2009
Shah HA, Koo I (2018) A novel physical layer security scheme in OFDM-based cognitive radio networks. IEEE Access 6:29486–29498
Sharifia AA, Sharifia M, Niyaa MJM (2016) Collaborative spectrum sensing under primary user emulation attack in cognitive radio networks. IETE J Res 62(2):205–211
Singh A, Bhatnagar MR, Mallik RK (2017) Physical layer security of a multiantenna-based CR network with single and multiple primary users. IEEE Trans Veh Technol 66(12):11011–11022
Singla S, Singh J (2013) Cloud data security using authentication and encryption technique. Int J Adv Res Comput Eng Technol (IJARCET) 2(7):2232–2235
Slimeni F, Scheers B, Chtourou Z, Le Nir V, Attia R (2015) Cognitive radio jamming mitigation using markov decision process and reinforcement learning. In: International conference on advanced wireless information and communication technologies (AWICT 2015), procedia computer science, vol 73, pp 199–208
Sorrells C, Qian L (2014) Quickest detection of denial-of-service attacks in cognitive wireless networks. Int J Netw Secur 16(6):468–476
Wang L-C, Wang C-W (2004) A cross-layer design of clustering architecture for wireless sensor networks. In: IEEE international conference on networking, sensing and control
Wang H, Yao Y-D (2018) Primary user boundary detection in cognitive radio networks: estimated secondary user locations and impact of malicious secondary users. IEEE Trans Veh Technol 67(5):4577–4588
Wang H, Lightfoot L, Li T (2010) On PHY-layer security of cognitive radio: collaborative sensing under malicious attacks. In: Annual conference on information sciences and systems (CISS), Princeton, NJ, IEEE, pp 1–6
Xie P, Zhang M, Zhang G, Zheng R, Xing L, Wu Q (2018) On physical-layer security for primary system in underlay cognitive radio networks. IET Netw 7(2):68–73
Xin CS, Song M (2014) Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Trans Mob Comput 13(5):1022–1034
Xing L, Ma Q, Gao S, Chen S (2018) An optimized algorithm for protecting privacy based on coordinates mean value for cognitive radio networks. IEEE Access 6:21971–21979
Xiong H, Li R, Eryilmaz A, Ekici E (2011) Delay-aware cross-layer design for network utility maximization in multi-hop networks. IEEE J Select Areas Commun 29(5)
Xu X, Yang W, Cai Y, Jin S (2016) On the secure spectral-energy efficiency tradeoff in random cognitive radio networks. IEEE J Select Areas Commun 34(10):2706–2722
Xu L, Nallanathan A, Pan X, Yang J, Liao W (2017) Security-aware resource allocation with delay constraint for NOMA-based cognitive radio network. IEEE Trans Inf Forensics Secur 13(2):366–376
Yan P, Zou Y, Zhu J (2018) Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems. IEEE Trans Veh Technol 67(3):2084–2096
Ye Z, Krishnamurthy SV, Tripathi SK (2003) A framework for reliable routing in mobile ad hoc networks. In: IEEE INFOCOM
Yu R, Zhang Y, Liu Y, Gjessing S, Guizani M (2016) Securing cognitive radio networks against primary user emulation attacks. IEEE Netw 30(6):62–69
Zhang H, Wang T, Song L, Han Z (2016) Interference improves PHY security for cognitive radio networks. IEEE Trans Inf Forensics Secur 11(3):609–620
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Elangovan, K., Subashini, S. Particle bee optimized convolution neural network for managing security using cross-layer design in cognitive radio network. J Ambient Intell Human Comput (2018). https://doi.org/10.1007/s12652-018-1007-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12652-018-1007-9