Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network

Routing in cognitive radio networks (CRNs) faces numerous limitations in misbehaving activities and secure the routing requests and reply messages. In this research work, Secure Distance based Improved LEACH Routing (SDILR) protocol is presented to avoid the primary user emulation attack (PUEA) in CRN. Initially, the nodes in the cognitive radio network are clustered by using distance based improved Low- energy adaptive clustering hierarchy (ILEACH). After the formation of clusters, secure routing is presented using support value based signature authentication to avoid PUEA. The proposed secure ILEACH routing results the secure data sharing through the primary user nodes PUEA.

[1]  Yuh-Ren Tsai,et al.  Coverage-preserving routing protocols for randomly distributed wireless sensor networks , 2007, IEEE Transactions on Wireless Communications.

[2]  Hammad Afzal,et al.  Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach , 2019, Telecommun. Syst..

[3]  Saima Zafar,et al.  Mobility-Aware Hierarchical Clustering in Mobile Wireless Sensor Networks , 2019, IEEE Access.

[4]  Shriraghavan Madbushi,et al.  Trust Establishment in Chaotic Cognitive Environment to Improve Attack Detection Accuracy Under Primary User Emulation , 2018 .

[5]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[6]  Sang Hyun Lee,et al.  Enhanced Message-Passing Based LEACH Protocol for Wireless Sensor Networks , 2019, Sensors.

[7]  Walid R. Ghanem,et al.  Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks , 2018, 2018 35th National Radio Science Conference (NRSC).

[8]  Yongcheng Li,et al.  Detecting Primary User Emulation Attack Based on Multipath Delay in Cognitive Radio Network , 2019 .

[9]  O. P. Sahu,et al.  Mitigating Primary User Emulation Attacks Using Analytical Model , 2019 .

[10]  Usman Ahmad,et al.  CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks , 2018, The Journal of Supercomputing.

[11]  Weichao Wang,et al.  Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding , 2013, J. Ubiquitous Syst. Pervasive Networks.

[12]  Naima Kaabouch,et al.  Security threats and countermeasures of MAC layer in cognitive radio networks , 2018, Ad Hoc Networks.

[13]  Abbas Ali Sharifi,et al.  Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach , 2018, Wirel. Networks.

[14]  Abdellah Najid,et al.  MS-routing-G i : routing technique to minimise energy consumption and packet loss in WSNs with mobile sink , 2018, IET Networks.

[15]  Raju Dutta,et al.  Improvement on LEACH Protocol in Wireless Sensor Networks , 2014 .

[16]  Mee Hong Ling,et al.  A Security-Enhanced Cluster Size Adjustment Scheme for Cognitive Radio Networks , 2019, IEEE Access.

[17]  Hui-fang Chen,et al.  On detecting primary user emulation attack using channel impulse response in the cognitive radio network , 2017, Frontiers of Information Technology & Electronic Engineering.

[18]  S. K. Mohapatra,et al.  Energy-efficient modified LEACH protocol for IoT application , 2018, IET Wirel. Sens. Syst..

[19]  V. Vijayarangan,et al.  Secure and reliable routing in cognitive radio networks , 2017, Wirel. Networks.

[20]  G. Umamaheswari,et al.  An Adaptive Learning-Based Attack Detection Technique for Mitigating Primary User Emulation in Cognitive Radio Networks , 2020, Circuits Syst. Signal Process..

[21]  Nhan Nguyen-Thanh,et al.  Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks , 2018, IEEE Transactions on Cognitive Communications and Networking.

[22]  Ayman El-Sayed,et al.  A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks , 2018, Int. J. Commun. Syst..

[23]  Adnan Yousaf,et al.  Performance Comparison of Various LEACH Protocols in Wireless Sensor Networks , 2019, 2019 IEEE 15th International Colloquium on Signal Processing & Its Applications (CSPA).