Security-aware Cooperation in Cognitive Radio Networks

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An introduction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and professionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.

[1]  N. Memon,et al.  Detection of misbehavior in cooperative diversity , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[2]  Joonhyuk Kang,et al.  Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy , 2011, 2011 IEEE International Conference on Communications (ICC).

[3]  Yang Han,et al.  Cooperative Spectrum Sharing Protocol with Secondary User Selection , 2010, IEEE Transactions on Wireless Communications.

[4]  Yang Han,et al.  Cognitive Spectrum Sharing With Two-Way Relaying Systems , 2011, IEEE Transactions on Vehicular Technology.

[5]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[6]  Qian Zhang,et al.  Cooperative Communication-Aware Spectrum Leasing in Cognitive Radio Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[7]  Yang Han,et al.  Cooperative spectrum sharing via controlled amplify-and-forward relaying , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[8]  H. Vincent Poor,et al.  Toward efficient radio spectrum utilization: user cooperation in cognitive radio networking , 2012, IEEE Network.

[9]  Nasir D. Memon,et al.  Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[10]  Jon W. Mark,et al.  A polarization enabled cooperation framework for cognitive radio networking , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[11]  Xiaohui Liang,et al.  GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.

[12]  Xuemin Shen,et al.  Risk-Aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks , 2014, IEEE Journal on Selected Areas in Communications.

[13]  Sisi Liu,et al.  Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.

[14]  Gyouhwan Kim Scheduling in wireless ad hoc networks: algorithms with performance guarantees , 2008 .

[15]  Weifeng Su,et al.  Active cooperation between primary users and cognitive radio users in cognitive ad-hoc networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[17]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[18]  Sung-Ju Lee,et al.  STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.

[19]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[20]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[21]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[22]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[23]  Michele Zorzi,et al.  Spectrum Leasing via Cooperative Opportunistic Routing Techniques , 2011, IEEE Transactions on Wireless Communications.

[24]  Xuemin Shen,et al.  Energy-efficient and trust-aware cooperation in cognitive radio networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[25]  Mehul Motani,et al.  Cooperate-and-Access Spectrum Sharing with ARQ-Based Primary Systems , 2012, IEEE Transactions on Communications.

[26]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[27]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[28]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[29]  Mingquan Wu,et al.  Exploiting MIMO antennas in cooperative cognitive radio networks , 2011, 2011 Proceedings IEEE INFOCOM.

[30]  Zhou Xianwei,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008 .

[31]  Yu-Dong Yao,et al.  Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions , 2012, IEEE Communications Magazine.

[32]  Yu-Dong Yao,et al.  A Selective-Relay Based Cooperative Spectrum Sensing Scheme without Dedicated Reporting Channels in Cognitive Radio Networks , 2011, IEEE Transactions on Wireless Communications.

[33]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[34]  Geoffrey Ye Li,et al.  Cooperative Spectrum Sensing in Cognitive Radio, Part I: Two User Networks , 2007, IEEE Transactions on Wireless Communications.

[35]  Dongwoo Kim,et al.  Cognitive relaying systems based on network and superposition coding in multiple access primary channels , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[36]  H. Vincent Poor,et al.  Cooperative cognitive radio networking using quadrature signaling , 2012, 2012 Proceedings IEEE INFOCOM.

[37]  Marco Levorato,et al.  Cognitive Access Policies under a Primary ARQ Process via Forward-Backward Interference Cancellation , 2013, IEEE Journal on Selected Areas in Communications.

[38]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[39]  Xuemin Shen,et al.  Cooperative networking towards secure communications for CRNs , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[40]  Min Wu,et al.  Tracing Malicious Relays in Cooperative Wireless Communications , 2007, IEEE Transactions on Information Forensics and Security.

[41]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[42]  Ying-Chang Liang,et al.  Optimization for Cooperative Sensing in Cognitive Radio Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[43]  Osvaldo Simeone,et al.  Spectrum Leasing via Cooperation With Multiple Primary Users , 2012, IEEE Transactions on Vehicular Technology.

[44]  Jianhui Wu,et al.  Secure wireless communications via cooperative relaying and jamming , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[45]  Aria Nosratinia,et al.  Opportunistic Spectrum Sharing Based on Exploiting ARQ Retransmission in Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[46]  Xuemin Shen,et al.  Cooperative cognitive radio networking for opportunistic channel access , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[47]  Yu Cheng,et al.  Mitigating selective forwarding attacks with a channel-aware approach in WMNS , 2010, IEEE Transactions on Wireless Communications.

[48]  Sang Wu Kim,et al.  Error probability in multi-source, multi-relay networks under falsified data injection attacks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[49]  H. Vincent Poor,et al.  Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.

[50]  Jon W. Mark,et al.  A quadrature signaling based cooperative scheme for Cognitive Radio Networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[51]  Ning Zhang,et al.  Towards secure communications in cooperative cognitive radio networks , 2013, 2013 IEEE/CIC International Conference on Communications in China (ICCC).

[52]  Bruce Bueno de Mesquita,et al.  An Introduction to Game Theory , 2014 .

[53]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[54]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.