Skip to main content

Advertisement

Log in

Particle bee optimized convolution neural network for managing security using cross-layer design in cognitive radio network

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Cognitive radio (CR) is one of the promising technologies for better utilization of radio spectrum. The parameters like operating frequency, transmission power, type of modulation etc., extend a major contribution in CR. These parameters helps to transmit the information in communication environment. The CR monitors their own performance and subsequently reads the radio outputs in radio frequency environment in an effective manner. During the process of this cognitive communication, security is one of the major issues owing to the factors such as anomalous spectrum usage, hindrance in the identification of primary and secondary spectrum users. This paper introduces Cross-Layer Design Based Particle Bee optimized Convolution Neural Network (CLPBCNN) for managing the security issues present in the cognitive radio networks. Initially, user’s spectrum has been sensed based on the energy level with cyclostationary process which helps to analyze the primary user related radio features. Along with the extracted user features, authentication is handled by symmetric triple data encryption algorithm and the features are trained by proposed network which examines the intermediate attacks and malicious activities. Furthermore, an efficient multi-path energy routing protocol is proposed to monitor the neighboring nodes and spectrum usage for detecting the attacks in CR. This process is repeated continuously for creating the effective attack free cognitive radio based wireless communication system. Then the excellence of the system is evaluated and validated with the help of NS2 simulation tool and the efficiency is analyzed in terms of miss detection probability, route dis-connectivity ratio, and detection delay. The effective utilization of this cyclostationary and routing process leads to overall improved performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Bakhtiari M, Nateghizad M, Zainal A (2013) Secure search over encrypted data in cloud computing. In: International conference on advanced computer science applications and technologies (ACSAT), 23–24, pp 290–295

  • Blesa J, Romero E, Rozas A Araujo A (2013) PUE attack detection in CWSNs using anomaly detection techniques. EURASIP J Wirel Commun Netw 1:1–13

    Google Scholar 

  • Brik V, Banerjee S, Gruteser M, Oh S (2008) Wireless device identification with radiometric signatures. In: ACM international conference on Mobile computing and networking, pp 116–127

  • Brown TX, Sethi A (2007) Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: a multi-dimensional analysis and assessment. In: cognitive radio oriented wireless networks and communications, 2007

  • Chang G-Y, Wang S-Y, Liu Y-X (2017) A jamming-resistant channel hopping scheme for cognitive radio networks. IEEE Trans Wirel Commun 16(10):6712–6725

    Article  Google Scholar 

  • Chen R, Park JM, Reed JH (2007) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Select Areas Commun 26(1)

  • Chen R, Park J-M, Reed J (2008) Defense against primary user emulation attacks in cognitive radio networks. IEEE J Select Areas Commun IEEE 26(1):25

    Article  Google Scholar 

  • Chen Z, Cooklev T, Chen C, Raez CP (2009) Modeling primary user emulation attacks and defenses in cognitive radio networks. In: International performance computing and communications conference, IEEE, Scottsdale, AZ pp 208–215

  • Ejaz W (2008) Spectrum sensing in cognitive radio networks. Computer Engineering, National University of Sciences and Technology, Pakistan

    Google Scholar 

  • Elangovan K, Subashini S (2016) A survey of security issues in cognitive radio network. ARPN J Eng Appl Sci 11(17):10496–10500

    Google Scholar 

  • Gai K, Qiu M, Ming Z, Zhao H Qiu L (2017) Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans Smart Grid 8(5):2431–2439

    Article  Google Scholar 

  • Ganesan D, Govindan R, Shenker S, Estrin D (2001) Energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mob Comput Commun Rev 5(4):11–25

    Article  Google Scholar 

  • Grissa M, Yavuz AA, Hamdaoui B (2017a) Location privacy preservation in database-driven wireless cognitive networks through encrypted probabilistic data structures. IEEE Trans Cogn Commun Netw 3(2):255–226

    Article  Google Scholar 

  • Grissa M, Hamdaoui B, Yavuza AA (2017b) Location privacy in cognitive radio networks: a survey. IEEE Commun Surv Tutor 19(3):1726–1760

    Article  Google Scholar 

  • Jadhav S (2011) Modular neural network based arrhythmia classification system using ECG signal data. IEEE EMBS conference on biomedical engineering and sciences (IECBES)

  • Jadhav S, Nalbalwar SL, Ghatol A (2010) Artificial Neural Network based cardiac arrhythmia classification using ECG signal data. In: International conference on electronics and information engineering (ICEIE), in IEEE

  • Khasawneh M, Agarwal A (2017) A secure and efficient authentication mechanism applied to cognitive radio networks. IEEE Access 5:15597–15608

    Article  Google Scholar 

  • Kotobi K, Bilen SG (2018) Secure blockchains for dynamic spectrum access: a decentralized database in moving cognitive radio networks enhances security and user access. IEEE Veh Technol Mag 13(1):32–39

    Article  Google Scholar 

  • Ng DWK, Lo ES, Schober R (2016) Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer. IEEE Trans Veh Technol 65(5):3166–3184

    Article  Google Scholar 

  • Le TN, Chin W-L, Chen H-H (2017) Standardization and security for smart grid communications based on cognitive radio technologies—a comprehensive survey. IEEE Commun Surv Tutor 19:423–445

    Article  Google Scholar 

  • Li D, Qn Y, Liu Z, Wu X, Zhang Z (2014) Mixed signal detection based on second-order cyclostationary features. In: IEEE military communications conference, Baltimore, MD, pp 682–687

  • Lin H, Hu J, Ma J, Xu L, Yu Z (2017) A secure collaborative spectrum sensing strategy in cyber-physical systems. IEEE Access 5:27679–27690

    Article  Google Scholar 

  • Liu Y, Zheng YF (2005) One-against-all multi-class SVM classification using reliability measures. IEEE Int Jt Conf Neural Netw 2:849–854

    Google Scholar 

  • Muthulakshmi S, Latha K (2012) Classification of ECG waveform using feature selection algorithm. In: IEEE international conference on advanced communication control and computing technologies (ICACCCT)

  • Nguyen V-D, Duong TQ, Shin O-S, Nallanathan A, Karagiannidis GK (2017) Enhancing PHY security of cooperative cognitive radio multicast communications. IEEE Trans Cogn Commun Netw 3(4):599–613

    Article  Google Scholar 

  • Parvin S, Hussain FK (2011) Digital signature-based secure communication in cognitive radio networks. In: Broadband and wireless computing, communication and applications in IEEE

  • Parvin S, Han S, Tian B, Hussain FK (2010) Trust-based authentication for secure communication in cognitive radio networks. In: IEEE/IFIP 8th international conference on embedded and ubiquitous computing (EUC)

  • Parvin S, Hussain FK, Hussain OK (2013) Conjoint trust assessment for secure communication in cognitive radio networks. Math Comput Model 58(5–6):1340–1350

    Article  Google Scholar 

  • Qian L, Li X, Wei S (2013) Cross-layer detection of stealthy jammers in multihop cognitive radio networks. In: International conference on computing, networking and communications (ICNC), IEEE, San Diego, CA, pp 1026–1030

  • Ramani V, Sharma SK (2017) Cognitive radios: a survey on spectrum sensing, security and spectrum handoff. China Commun 14(11):185–208

    Article  Google Scholar 

  • Saghiri AM, Vahdati M, Gholizadeh K, Meybodi MR, Dehghan M, Rashidi H (2018) A framework for cognitive internet of things based on blockchain. In: 2018 4th International conference on web research (ICWR), IEEE, pp 138–143

  • Salameh HAB, Almajali S, Ayyash M, Elgala H (2018) Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet Things J 5(3):1904–1913

    Article  Google Scholar 

  • Sanyal S, Bhadauria R, Ghosh C (2009) Secure communication in cognitive radio networks. In: 4th International conference on computers and devices for communication, CODEC 2009

  • Shah HA, Koo I (2018) A novel physical layer security scheme in OFDM-based cognitive radio networks. IEEE Access 6:29486–29498

    Article  Google Scholar 

  • Sharifia AA, Sharifia M, Niyaa MJM (2016) Collaborative spectrum sensing under primary user emulation attack in cognitive radio networks. IETE J Res 62(2):205–211

    Article  Google Scholar 

  • Singh A, Bhatnagar MR, Mallik RK (2017) Physical layer security of a multiantenna-based CR network with single and multiple primary users. IEEE Trans Veh Technol 66(12):11011–11022

    Article  Google Scholar 

  • Singla S, Singh J (2013) Cloud data security using authentication and encryption technique. Int J Adv Res Comput Eng Technol (IJARCET) 2(7):2232–2235

    Google Scholar 

  • Slimeni F, Scheers B, Chtourou Z, Le Nir V, Attia R (2015) Cognitive radio jamming mitigation using markov decision process and reinforcement learning. In: International conference on advanced wireless information and communication technologies (AWICT 2015), procedia computer science, vol 73, pp 199–208

  • Sorrells C, Qian L (2014) Quickest detection of denial-of-service attacks in cognitive wireless networks. Int J Netw Secur 16(6):468–476

    Google Scholar 

  • Wang L-C, Wang C-W (2004) A cross-layer design of clustering architecture for wireless sensor networks. In: IEEE international conference on networking, sensing and control

  • Wang H, Yao Y-D (2018) Primary user boundary detection in cognitive radio networks: estimated secondary user locations and impact of malicious secondary users. IEEE Trans Veh Technol 67(5):4577–4588

    Article  Google Scholar 

  • Wang H, Lightfoot L, Li T (2010) On PHY-layer security of cognitive radio: collaborative sensing under malicious attacks. In: Annual conference on information sciences and systems (CISS), Princeton, NJ, IEEE, pp 1–6

  • Xie P, Zhang M, Zhang G, Zheng R, Xing L, Wu Q (2018) On physical-layer security for primary system in underlay cognitive radio networks. IET Netw 7(2):68–73

    Article  Google Scholar 

  • Xin CS, Song M (2014) Detection of PUE attacks in cognitive radio networks based on signal activity pattern. IEEE Trans Mob Comput 13(5):1022–1034

    Article  Google Scholar 

  • Xing L, Ma Q, Gao S, Chen S (2018) An optimized algorithm for protecting privacy based on coordinates mean value for cognitive radio networks. IEEE Access 6:21971–21979

    Article  Google Scholar 

  • Xiong H, Li R, Eryilmaz A, Ekici E (2011) Delay-aware cross-layer design for network utility maximization in multi-hop networks. IEEE J Select Areas Commun 29(5)

  • Xu X, Yang W, Cai Y, Jin S (2016) On the secure spectral-energy efficiency tradeoff in random cognitive radio networks. IEEE J Select Areas Commun 34(10):2706–2722

    Article  Google Scholar 

  • Xu L, Nallanathan A, Pan X, Yang J, Liao W (2017) Security-aware resource allocation with delay constraint for NOMA-based cognitive radio network. IEEE Trans Inf Forensics Secur 13(2):366–376

    Article  Google Scholar 

  • Yan P, Zou Y, Zhu J (2018) Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems. IEEE Trans Veh Technol 67(3):2084–2096

    Article  Google Scholar 

  • Ye Z, Krishnamurthy SV, Tripathi SK (2003) A framework for reliable routing in mobile ad hoc networks. In: IEEE INFOCOM

  • Yu R, Zhang Y, Liu Y, Gjessing S, Guizani M (2016) Securing cognitive radio networks against primary user emulation attacks. IEEE Netw 30(6):62–69

    Article  Google Scholar 

  • Zhang H, Wang T, Song L, Han Z (2016) Interference improves PHY security for cognitive radio networks. IEEE Trans Inf Forensics Secur 11(3):609–620

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Elangovan.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elangovan, K., Subashini, S. Particle bee optimized convolution neural network for managing security using cross-layer design in cognitive radio network. J Ambient Intell Human Comput (2018). https://doi.org/10.1007/s12652-018-1007-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-018-1007-9

Keywords

Navigation