Preventing Cognitive User Emulation Attack in Cognitive Radio Network by Calculating Trust Values Using Fuzzy Logic

Authors

  • Spriha Pandey*  Department of Electronics and Communication Engineering, Babu Banarasi Das University, Lucknow, India
  • Ashawani Kumar  Department of Electronics and Communication Engineering, Babu Banarasi Das University, Lucknow, India

DOI:

https://doi.org/10.32628/IJSRSET1218645

Keywords:

Cognitive User Emulation Attack (CUEA), Cognitive Radio Network (CRN), Spectrum Handoff, Trust Value/Factor (TV/TF), Fuzzy Logic.

Abstract

Cognitive radio has proved to be an efficient and promising technology for the future of wireless networks. Its major and fundamental aim is to utilize the spectrum bands which are not efficiently exercised. These bands can be accessed using Opportunistic Spectrum Access (OSA), by a secondary user only when primary user is not transmitting over the channel. Cognitive radio manages spectrum through its cognitive radio cycle, which performs a set of management functions such as, spectrum sensing, spectrum assignment, spectrum sharing and spectrum mobility/handoff. During this cycle, at several stages, cognitive radio is very much vulnerable to security attacks. This is also due to the exposed nature of cognitive radio architecture. One such security attack which has not been much explored and can cause serious security issues is Cognitive User Emulation Attack (CUEA). This attack is expected to occur at the time of spectrum handoff. In this article the reason of occurrence of CUEA is explained along with counter measures to prevent this threat in the network by implementing trust mechanism using fuzzy logic. The proposed system is simulated and analyzed using MATLAB tool.

References

  1. I.F. Akyildiz, L. Won-Yeol, C.V. Mehmet and M. Shantidev, “Next generation/dynamic spectrum access/ cognitive radio wireless networks; a survey”, Computer Networks, 50(2); 2127-2159, 2006.
  2. J. Mitola III, “Cognitive radio: An integrated agent architecture for software defined radio.” PhD thesis, Royal Institute of Technology (KTH), Stockholm, Sweden, May 2000.
  3. John A. Stine and David L. Portigal, "Spectrum 101: An Introduction to Spectrum Management", March 2004, MITRE TECHNICAL REPORT
  4. Spriha Pandey and Ashawani Kumar, “A Review on Modern Spectrum Sensing and Assignment Techniques In CRN”, International Journal of Scientific Research in Science, Engineering and Technology, Vol. 8, issue 2, pg. 171-181, 2021.
  5. Yingkun Wen, Yan Huo, Liran Mao, Tao Jing and Qinghe Gao, "A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks", 2019, 2895639, IEEE Transactions on Vehicular Technology.
  6. Mee Hong Ling, Kok-Lim Alvin Yau, Junaid Qadir and Qiang Ni, "A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks", 2018,2881135, IEEE Transactions on Cognitive Communications and Networking.
  7. Yenumula B. Reddy, "Security Issues and Threats in Cognitive Radio Networks" AICT 2013 : The Ninth Advanced International Conference on Telecommunications, 978-1-61208-279-0
  8. D. Ganesh and T. Pavan Kumar, "A Survey on advances in security threats and its countermeasures in cognitive radio networks" International Journal of Engineering & Technology, Vol 7, issue 2.8, 2018, 372-378
  9. Geetanjali Rathee, Prabhat Thakur, G Singh and Hemraj Saini, "Aspects of Secure Communication during Spectrum Handoff in Cognitive Radio Networks", IEEE, 2016, 978-1-5090-2684-5
  10. Geetanjali Rathee, Naveen Jaglan, Sahil Garg, Bong Jun Choi, and Kim-Kwang Raymond Choo, "A Secure Spectrum Handoff Mechanism in Cognitive Radio Networks", IEEE Transactions, 2020 2971703
  11. L. Giupponi and Ana I. Pérez-Neira, "Fuzzy-based Spectrum Handoff in Cognitive Radio Networks",  2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008), 15-17 May 2008.
  12. S.Haykin, “Cognitive radio: brain-empowered wireless communications," vol. 23, no.2, pp. 201{220, February 2005
  13. J. Mitola III and G. Maguire Jr, “Cognitive radio: making software radios more personal,” Personal Communications, IEEE, vol. 6, no. 4, pp. 13–18, 1999
  14. F. K. Jondarl, “Software-defined radio: basics and evolution to cognitive radio," EURASIP J. Wirel. Commun. Netw., vol 2005, no. 3, pp. 275{283, 2005.
  15. V. Bose, “A software driven approach to SDR design,” COTS Journal, Jan. 2004.
  16. Monisha Devi, Nityananda Sarma and Sanjib Kumar Deka, “A General Framework for Spectrum Assignment in Cognitive Radio Networks” Springer, Advanced Computing and Communication Technologies vol.702, 2019, pp 163-172.
  17. Q. Zhao et al., “Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad Hoc Networks: A POMDP Framework,” IEEE JSAC, vol. 25, no. 3, Apr. 2007, pp. 589–99.
  18. R. Menon, R. M. Buehrer, and J. H. Reed, “Outage Probability Based Comparison of Underlay and Overlay Spectrum Sharing Techniques,” Proc. IEEE DySPAN 2005, Nov. 2005, pp. 101–9.
  19. Senhua Huang, Xin Liu, and Zhi Ding, “Opportunistic Spectrum Access in Cognitive Radio Networks” IEEE Communications., The 27th Conference on Computer Communications.
  20. Wajdi Alhakami, Ali Mansour and Ghazanfar A. Safdar, "Spectrum Sharing Security and Attacks in CRNs: a Review", International Journal of Advanced Computer Science and Applications, Vol. 5, No. 1, 2014
  21. Wang C-W and Wang L-C. "Analysis of reactive spectrum handoff in cognitive radio networks",  IEEE Journal on Selected Areas in Communications Volume: 30, Issue: 10, November 2012
  22. Krishan Kumar , Arun Prakash and Rajeev Tripathi, "Spectrum handoff in cognitive radio networks: A classification and comprehensive survey", Journal of Network and Computer Applications, Oct 2015, 1084-8045
  23. Prince Semba Yawada and Mai Trung Dong, "Intelligent Process of Spectrum Handoff/Mobility in Cognitive Radio Networks", Journal of Electrical and Computer Engineering, Mar 2019, Article ID 7692630
  24. Julie Thomas and Prasanth P Menon, "A Survey on Spectrum Handoff in Cognitive Radio Networks", Internantional Conference on Innovations in Information Embedded and Communication Systems, Mar 2017
  25. S. Parvin, F. K. Hussain, O. K. Hussain, S. Han, B. Tian, and E. Chang, “Cognitive radio network security: A survey”, Journal of Network and Computer Applications, 2012, vol. 35, pp. 1691–1708
  26. J. Xiong, D. Ma, H. Zhao, and F. Gu, “Secure multicast communications in cognitive satellite-terrestrial networks,” IEEE Commun. Letters, vol. 23, no. 4, pp. 632–635, 2019.
  27. Y. Wang, X. Tang, and T. Wang, “A unified QoS and security provisioning framework for wiretap cognitive radio networks: Astatistical queueing analysis approach,” IEEE Trans. on Wireless Commun., vol. 18, no. 3, pp. 1548–1565, 2019.
  28. A.G. Fragkiadakis, E. Z. Tragos and I. G. Askoxylakis, “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks”, IEEE Communications Surveys & Tutorials, 2013, vol. 15, issue: 1 , pp. 428 -445.
  29. M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized trust management,” 1996. [Online]. Available: http://citeseer.ist.psu.edu/blaze96decentralized.html
  30. V. Oleshchuk, “Trust-based framework for security enhancement of wireless sensor networks,” in Intelligent Data Acquisition and Advanced 347Computing Systems: Technology and Applications, IDAACS, 4th IEEE Workshop on, 2007, pp. 623–627.
  31. T. Qin, H. Yu, C. Leung, Z. Shen, and C. Miao, “Towards a trust aware cognitive radio architecture,” SIGMOBILE Mob. Comput. Commun. Rev., vol. 13, no. 2, pp. 86–95, Sep. 2009.
  32. W. Wang, H. Li, Y. Sun, and Z. Han, “Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks,” EURASIP J. Adv. Signal Process, vol. 2010, pp. 4:4–4:4, Jan. 2010.
  33. Z. Yuan, D. Niyato, H. Li, and Z. Han, “Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks,” in Wireless Communications and Networking Conference (WCNC), 2011 IEEE, 2011, pp. 599–604.
  34. Yingkun Wen, Yan Huo, Liran Mao, Tao Jing and Qinghe Gao, "A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks", 2019, 2895639, IEEE Transactions on Vehicular Technology.
  35. L. Giupponi and Ana I. Pérez-Neira, "Fuzzy-based Spectrum Handoff in Cognitive Radio Networks",  2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008), 15-17 May 2008.
  36. Aruna Bajpai and Virendra Singh Kushwah, “Importance of Fuzzy Logic and Application Areas in Engineering Research”, International Journal of Recent Technology and Engineering (IJRTE), Volume-7 Issue-6, March 2019.
  37. Vinod Kumar and R.R.Joshi, “Hybrid Controller based Intelligent Speed Control of Induction Motor”, Journal of Theoretical and Applied Information Technology, 2005.
  38. Padmalaya Nayak, and Anurag Devulapalli, “A Fuzzy Logic-Based Clustering Algorithm for WSN to Extend the Network Lifetime”, IEEE SENSORS JOURNAL, VOL. 16, NO. 1, JANUARY 1, 2016
  39. Rabia Aziz, C.K. Verma, Namita Srivastava, “A fuzzy based feature selection from independent component subspace for machine learning classification of microarray data”, genomic data 8 (2016) 4-15, 2016 elsevier inc.
  40. Mohsen Bakhshi, Mohammad Hosein Holakooie, Abbas Rabiee, “Fuzzy based damping controller for TCSC using local measurements to enhance transient stability of power systems”, Electrical Power and Energy Systems 85 (2017) 12–21
  41. Martin Maca’s and Lenka Lhotsk’a, "Social Impact Theory Based Optimizer", ECAL 2007, LNAI 4648, pp. 635–644, 2007, Springer-Verlag Berlin Heidelberg 2007.

Downloads

Published

2021-12-30

Issue

Section

Research Articles

How to Cite

[1]
Spriha Pandey*, Ashawani Kumar "Preventing Cognitive User Emulation Attack in Cognitive Radio Network by Calculating Trust Values Using Fuzzy Logic" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 6, pp.239-250, November-December-2021. Available at doi : https://doi.org/10.32628/IJSRSET1218645