Double Auction Framework to Manage the Secondary Users in Cognitive Radio Networks (Crns)
-
https://doi.org/10.14419/ijet.v7i3.20.28421 -
Cognitive Radio Network, Dynamic Spectrum Leasing (DSL), Spectrum Sensing Data Falsification (SSDF) attack, Double Auction Framework (DAF). -
Abstract
Cognitive Radio Networks (CRNs) is an emerging concept in wireless access between the users. The CRNs intend towards effective utilization of frequency spectrum when the licensed user is not utilizing the spectrum. The CRNs are vulnerable to security issues like general networks. Security provisioning plays a vital role in CRNs for authorizing the information being shared among the legitimate Primary Users (PUs) and the opportunistic Secondary Users (SUs). This work mainly focuses on the mitigation of selfishness among the unlicensed users during the presence of multiple malicious users. In this work, we consider a beam-forming based Dynamic Spectrum Leasing (DSL) [34] concept to enhance the spectrum utilization for the communication between the primary and secondary users. We propose a Double Auction Framework (DAF) for improving the Selfish SU detection rate during the presence of malicious users to improve the number of opportunistic Users without creating hindrance to the legitimate User. The Simulation results reveal that the DAF-DSL based scheme provides effective spectral gains comparing with the baseline scheme for the secondary users spectrum utilization.
Â
-
References
[1] I.Stanojev, O. Simeone, S. Savazzi, Y. Bar-Ness, U. Spagnolini, and R. Pickholtz, “Spectrum leasing to cooperating secondary ad hoc networks,†IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 203–213, Jan. 2008
[2] Suchismita Bhattacharjee, Roshni Rajkumari, Ningrinla Marchang,†Cognitive Radio Networks Security Threats and Attacks: A Reviewâ€. International Conference on Information and Communication Technologies (ICICT- 2014)
[3] Shakeel PM, Baskar S, Dhulipala VS, Mishra S, Jaber MM., “Maintaining security and privacy in health care system using learning based Deep-Q-Networksâ€, Journal of medical systems, 2018 Oct 1;42(10):186.https://doi.org/10.1007/s10916-018-1045-z
[4] Hano Wang, Jemin Lee, Sungtae Kim, Student Member, IEEE, and Daesik Hong, Senior Member, IEEE, “Capacity of Secondary Users Exploiting Multi-spectrum and Multiuser Diversity in Spectrum-Sharing Environments†IEEE transactions on vehicular technology, vol. 59, no. 2, february 2010.
[5] Ying-Chang Liang, Fellow, IEEE, Kwang-Cheng Chen, Fellow, IEEE, Geoffrey Ye Li, Fellow, IEEE, and Petri Mähönen, Senior Member, IEEE “Cognitive Radio Networking and Communications: An Overviewâ€. IEEE transactions on vehicular technology, vol. 60, no. 7, september 2011.
[6] Hong Wen, Shaoqian Li, Xiping Zhu, and Liang Zhou, “A Framework of the PHY-layer Approach to Defence Against Security Threats in Cognitive Radio Networks†(UESTC) IEEE Network May/2013
[7] Ehsan Nekouei, Student Member, IEEE, Hazer Inaltekin, Member, IEEE, and Ubhrakanti Dey, Senior Member, IEEE “Power Control and Asymptotic Throughput Analysis for the Distributed Cognitive Uplinkâ€. IEEE transactions on communications, vol. 62, no. 1, January 2014
[8] Enrique Hern_andez-Orallo, Member, IEEE, Manuel David Serrat Olmos, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni, Member, IEEE , “CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodesâ€. IEEE Transactions on Mobile Computing1536-1233 (c) 2013
[9] Xiaoyan Wang, Member, IEEE, Yusheng Ji, Member, IEEE, Hao Zhou, Member, IEEE, and Jie Li, Senior Member, IEEE “Auction Based Frameworks for Secure Communications in Static and Dynamic Cognitive Radio Networks†IEEE Transactions on Vehicular Technology 2016.
[10] “Throughput Scaling in Cognitive Multiple Access With Average Power and Interference Constraints “.Ehsan Nekouei, Student Member, IEEE, Hazer Inaltekin, Member, IEEE, and Subhrakanti Dey, Senior Member, IEEE Volume IEEE Transactions On Signal Processing, Vol. 60, No. 2, February 2012
[11] “Multi-Phase Smart Relaying and Cooperative Jamming in Secure Cognitive Radio Networksâ€. Pin-Hsun Lin, Member, IEEE, Frédéric Gabry, Member, IEEE, Ragnar Thobaben, Member, IEEE, Eduard A. Jorswieck, Senior Member, IEEE, and Mikael Skoglund, Senior Member IEEE, IEEE Transactions On Cognitive Communications And Networking, Vol. 2, No. 1, March 2016
[12] J. Khun-Jush, P. Bender, B. Deschamps, and M. Gundlach, “Licensed shared access as complementary approach to meet spectrum demands: Benefits for next generation cellular systems,†in Proc. ETSI Workshop Reconfigurable Radio Syst., 2012, pp. 1–7.
[13] R. Etkin, A. Parekh, and D. Tse, “Spectrum sharing for unlicensed bands,†IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 517–528, Apr. 2007.
[14] J. M. Peha, “Approaches to spectrum sharing,†IEEE Commun. Mag., vol. 43, no. 2, Feb. 2005.
[15] Suchita S. Potdar1, Dr. Mallikarjun, “Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theoryâ€. 3 Issue 8, August 2014.
[16] Y. Yi, J. Zhang, Q. Zhang, T. Jiang, and J. Zhang, “Cooperative communication-aware spectrum leasing in cognitive radio networksâ€, in Proc. IEEE Symp. New Frontiers Dynamic Spectrum, Apr. 2010, pp. 1–11.
[17] S. K. Jayaweera, M. Bkassiny, and K. A. Avery, “Asymmetric cooperative communications based spectrum leasing via auctions in cognitive radio networks,†IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2716–2724, Aug. 2011.
[18] [18] M. Hafeez and J. M. H. Elmirghani, “Dynamic spectrum leasing for beam-forming cognitive radio networks using network coding,†in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2013, pp. 2840–2845.
[19] Ju Ren, Student Member, IEEE, Yaoxue Zhang, Qiang Ye, Kan Yang, Kuan Zhang, and Xuemin (Sherman) Shen, Fellow, IEEE "Exploiting Secure and Energy Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks" JUNE, 2016
[20] H. Hakim, W. Ajib, and H. Boujemaa, “Spectrum sharing for bidirectional communication in cognitive radio networks,†in IEEE 9th Int. Conf. Wireless Mobile Comput., Netw. Commun. (WiMob), Oct. 2013, pp. 763–768.
[21] P. Mohamed Shakeel; Tarek E. El. Tobely; Haytham Al-Feel; Gunasekaran Manogaran; S. Baskar., “Neural Network Based Brain Tumor Detection Using Wireless Infrared Imaging Sensorâ€, IEEE Access, 2019, Page(s): 1
[22] Vishakha Ramani, Sanjay K. Sharma, “Cognitive radios: A survey on spectrum sensing, security and spectrum handoffâ€, China Communications, 2017, Pages: 185 – 208.
[23] Ping Xie, Moli Zhang, Gaoyuan Zhang, Ruijuan Zheng, Ling Xing; Qingtao Wu, "On Physical-layer security for primary system in underlay cognitive radio networksâ€, IET Networks, Year: 2018, Volume: 7, Issue: 2, Pages: 68 - 73.
[24] Lei Xu, Arumugam Nallanathan, Xiaofei Pan, Jian Yang, Wenhe Liao, “Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Networkâ€, IEEE Transactions on Information Forensics and Security, Page(s): 366 – 376, 2017.
[25] Li-Chun Wang ; Chung-Wei Wang, “A cross-layer design of clustering architecture for wireless sensor networksâ€, IEEE International Conference on Networking, Sensing and Control, 2004.
-
Downloads
-
How to Cite
Elangovan, K., & Subashini, S. (2018). Double Auction Framework to Manage the Secondary Users in Cognitive Radio Networks (Crns). International Journal of Engineering & Technology, 7(3.20), 935-940. https://doi.org/10.14419/ijet.v7i3.20.28421Received date: 2019-03-15
Accepted date: 2019-03-15