Trust and reputation management in cognitive radio networks: a survey

Cognitive radio CR, which is the next generation wireless communication system, enables unlicensed users or secondary users SUs to exploit underutilized spectrum called white spaces owned by the licensed users or primary users PUs so that bandwidth availability improves at the SUs, which helps to improve overall spectrum utilization. Collaboration is an intrinsic characteristic of CR to improve network performance. For instance, in collaborative spectrum sensing, SU hosts generate sensing outcomes, and collaborate amongst themselves through making final decisions at a decision fusion center in order to improve the accuracy of spectrum sensing. The requirement to collaborate has inevitably opened doors to various forms of attacks by malicious SUs, and this critical issue can be addressed using trust and reputation management TRM, and so this is the focus of this article. Generally speaking, TRM detects malicious SUs, including honest SUs that turn malicious. Hence, TRM is of paramount importance in most kinds of schemes that require collaboration in CR networks. Our contribution in this article is as follows. This article provides an extensive survey on the application of TRM in various schemes in CR networks in order to ameliorate the effects of malicious SUs in collaboration. The discussion is presented with respect to a TRM taxonomy, various approaches to achieve TRM, various attack models, as well as the challenges and characteristics associated with TRM. Because of the significance of TRM in collaboration, this article presents a wide range of open issues to warrant further research in this area. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[2]  Dirk Grunwald,et al.  Scalability of cognitive radio control algorithms , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.

[3]  Shuai Li,et al.  Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing , 2011, 2011 IEEE International Conference on Communications (ICC).

[4]  Carlo S. Regazzoni,et al.  A comparison among cooperative spectrum sensing approaches for cognitive radios , 2010, 2010 2nd International Workshop on Cognitive Information Processing.

[5]  Bahman Abolhassani,et al.  Optimum number of secondary users and optimum fusion rule in cooperative spectrum sensing to maximize channel throughput , 2010, 2010 5th International Symposium on Telecommunications.

[6]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[7]  Chunyan Miao,et al.  Dynamic witness selection for trustworthy distributed cooperative sensing in cognitive radio networks , 2011, 2011 IEEE 13th International Conference on Communication Technology.

[8]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[9]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[10]  Guanghua Zhang,et al.  Using Trust to Establish Cooperative Spectrum Sensing Framework , 2011 .

[11]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[12]  Shu Wang,et al.  Secure cooperative spectrum sensing for Cognitive Radio networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[13]  Zhu Han,et al.  Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..

[14]  Mainak Chatterjee,et al.  Trust based fusion over noisy channels through anomaly detection in cognitive radio networks , 2011, SIN '11.

[15]  Xiaohong Jiang,et al.  A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Security.

[16]  Lei Zhang,et al.  A new cooperative spectrum sensing algorithm for cognitive radio networks , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[17]  Haiming Wang,et al.  Double Thresholds Based Cooperative Spectrum Sensing Against Untrusted Secondary Users in Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[18]  Sae-Young Chung,et al.  Cognitive Networks Achieve Throughput Scaling of a Homogeneous Network , 2008, IEEE Transactions on Information Theory.

[19]  Song Han,et al.  Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[20]  Prasant Mohapatra,et al.  Trusted collaborative spectrum sensing for mobile cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.

[21]  Qingqi Pei,et al.  A Trust Management Model in Centralized Cognitive Radio Networks , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[22]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[23]  H. T. Mouftah,et al.  A stable clustering formation infrastructure protocol in mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[24]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[25]  Jin Wei,et al.  Two-Tier Optimal-Cooperation Based Secure Distributed Spectrum Sensing for Wireless Cognitive Radio Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[26]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..

[27]  Zhu Han,et al.  Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[28]  H. Vincent Poor,et al.  Cooperative Sensing With Imperfect Reporting Channels: Hard Decisions or Soft Decisions? , 2012, IEEE Transactions on Signal Processing.

[29]  Zhu Han,et al.  Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[30]  Ying-Chang Liang,et al.  Cognitive radio network architecture: part II -- trusted network layer structure , 2008, ICUIMC '08.

[31]  Kamran Arshad,et al.  Robust collaborative spectrum sensing based on beta reputation system , 2011, 2011 Future Network & Mobile Summit.

[32]  Zhu Han,et al.  Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.

[33]  Chunyan Miao,et al.  Towards a trust aware cognitive radio architecture , 2009, MOCO.

[34]  Amir Ghasemi,et al.  Opportunistic Spectrum Access in Fading Channels Through Collaborative Sensing , 2007, J. Commun..

[35]  Juan Hernández-Serrano,et al.  Cooperative detection of primary user emulation attacks in CRNs , 2012, Comput. Networks.

[36]  Igor Nai Fovino,et al.  Distributed access control policies for spectrum sharing , 2013, Secur. Commun. Networks.

[37]  Yiwei Thomas Hou,et al.  Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.

[38]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[39]  Robert Hooke,et al.  `` Direct Search'' Solution of Numerical and Statistical Problems , 1961, JACM.

[40]  Huifang Chen,et al.  Reputation-based collaborative spectrum sensing algorithm in Cognitive Radio networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[41]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[42]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[43]  Abolfazl Falahati,et al.  SSDF protection in cooperative spectrum sensing employing a computational trust evaluation algorithm , 2010, 2010 5th International Symposium on Telecommunications.

[44]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[45]  Wenliang Du,et al.  Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.

[46]  Vic Barnett,et al.  Outliers in Statistical Data , 1980 .