Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks

The cognitive radio network (CR) is a primary and promising technology to distribute the spectrum assignment to an unlicensed user (secondary users) which is not utilized by the licensed user (primary user).The cognitive radio network frames a reactive security policy to enhance the energy monitoring while using the CR network primary channels. The CR network has a good amount of energy capacity using battery resource and accesses the data communication via the time-slotted channel. The data communication with moderate energy-level utilization during transmission is a great challenge in CR network security monitoring, since intruders may often attack the network in reducing the energy level of the PU or SU. The framework used to secure the communication is using the discrete-time partially observed Markov decision process. This system proposes a modern data communication-secured scheme using private key encryption with the sensing results, and eclat algorithm has been proposed for energy detection and Byzantine attack prediction. The data communication is secured using the AES algorithm at the CR network, and the simulation provides the best effort-efficient energy usage and security.

[1]  R. Varatharajan,et al.  CEMulti-core Architecture for Optimization of Energy over Heterogeneous Environment with High Performance Smart Sensor Devices , 2018, Wirel. Pers. Commun..

[2]  Aslam Durvesh,et al.  Detection of Multiple Selfish Attack Nodes in Cognitive Radio : a Review , 2016 .

[3]  P. Subbulakshmi,et al.  Optimization using Artificial Bee Colony based clustering approach for big data , 2018, Cluster Computing.

[4]  Bo Ai,et al.  Finite-state Markov channel modeling for vehicle-to-infrastructure communications , 2014, 2014 IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014).

[5]  Jong Min Kim,et al.  Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks , 2016, J. Sensors.

[6]  S. Vimal,et al.  SECURE DATA PACKET TRANSMISSION IN MANET USING ENHANCED IDENTITY-BASED CRYPTOGRAPHY (EIBC) , 2016 .

[7]  Jaydip Sen,et al.  A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks , 2013, ArXiv.

[8]  Miguel González-Mendoza,et al.  Wireless Channel Model with Markov Chains Using MATLAB , 2012 .

[9]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[10]  Tongtong Li,et al.  Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[11]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[12]  C. Van Hoof,et al.  Micropower energy harvesting , 2009, ESSDERC 2009.

[13]  P. Subbulakshmi,et al.  Honest Auction Based Spectrum Assignment and Exploiting Spectrum Sensing Data Falsification Attack Using Stochastic Game Theory in Wireless Cognitive Radio Network , 2018, Wirel. Pers. Commun..

[14]  Juebo Wu,et al.  Research and Analysis on Cognitive Radio Network Security , 2012 .

[15]  Xi-Ren Cao,et al.  Partially Observable Markov Decision Processes With Reward Information: Basic Ideas and Models , 2007, IEEE Transactions on Automatic Control.

[16]  Liang Xiao,et al.  Game-Theoretic Approach against Selfish Attacks in Cognitive Radio Networks , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.

[17]  Shriraghavan Madbushi,et al.  Trust Establishment in Chaotic Cognitive Environment to Improve Attack Detection Accuracy Under Primary User Emulation , 2018 .

[18]  Aslam Durvesh,et al.  Research Paper on Detection of Multiple Selfish Attack Nodes Using RSA in Cognitive Radio , 2016 .

[19]  S. Thylashri,et al.  Vitality and peripatetic sustain cluster key management schemes in MANET , 2018 .

[20]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[21]  Bhaskar Krishnamachari,et al.  On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance , 2007, IEEE Transactions on Wireless Communications.

[22]  Danda B. Rawat,et al.  Recent security issues on cognitive radio networks: A survey , 2016, SoutheastCon 2016.

[23]  Hanna Bogucka,et al.  Energy-Efficient Cooperative Spectrum Sensing: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[24]  A. Suresh,et al.  Predictive big data analytic on demonetization data using support vector machine , 2018, Cluster Computing.

[25]  George K. Karagiannidis,et al.  On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.

[26]  Hwee Pink Tan,et al.  Empirical modeling of a solar-powered energy harvesting wireless sensor node for time-slotted operation , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[27]  Moslem Amiri,et al.  Measurements of energy consumption and execution time of different operations on Tmote Sky sensor nodes , 2010 .

[28]  Cheng Wu,et al.  Energy-efficiency opportunistic spectrum allocation in cognitive wireless sensor network , 2018, EURASIP J. Wirel. Commun. Netw..

[29]  Sungsoo Park,et al.  Optimal Spectrum Access for Energy Harvesting Cognitive Radio Networks , 2013, IEEE Transactions on Wireless Communications.

[30]  L. Kalaivani,et al.  Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks , 2017, Cluster Computing.

[31]  Yang Qin,et al.  An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors , 2012, Comput. Networks.

[32]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[33]  Hadeel S. Abed,et al.  Improvement of energy consumption in cognitive radio by reducing the number of sensed samples , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).

[34]  Hong Shen Wang,et al.  Finite-state Markov channel-a useful model for radio communication channels , 1995 .

[35]  Hemlata Patil,et al.  Energy-Decisive and Upgrade Cooperative Spectrum Sensing in Cognitive Radio Networks , 2016 .