Secure and reliable routing in cognitive radio networks

Due to the mobility of node and different spectrum availability pattern, CR networks are frequently divided into unpredictable partitions. Usually, these partitions are irregularly connected; hence, secure and reliable routing becomes major issue for these types of network. In order to overcome these issues, we propose a secure and reliable routing in CRN based on distributed Boltzmann–Gibbs learning algorithm. This algorithm is implemented for relay node selection phase. In addition, the authentication is done based on secure routing distributed Boltzmann–Gibbs learning algorithm. We consider the metrics such as trust value and total delay for the successful and reliable transmission of the packet. Also, in order to increase the reliability, we implement LDPC code at the time of relay node selection phase. The proposed code helps to cancel any kind of electronic interference and channel noise interference.

[1]  Ying-Chang Liang,et al.  A retransmission-based scheme for video streaming over wireless channels , 2010, CMC 2010.

[2]  Athanasios V. Vasilakos,et al.  Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[3]  Athanasios V. Vasilakos,et al.  EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks , 2015, IEEE/ACM Transactions on Networking.

[4]  Yue Zhang,et al.  Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.

[5]  Juebo Wu,et al.  Research and Analysis on Cognitive Radio Network Security , 2012 .

[6]  Naixue Xiong,et al.  Context-Aware Middleware for Multimedia Services in Heterogeneous Networks , 2010, IEEE Intelligent Systems.

[7]  Athanasios V. Vasilakos,et al.  A Biology-Based Algorithm to Minimal Exposure Problem of Wireless Sensor Networks , 2014, IEEE Transactions on Network and Service Management.

[8]  Chittabrata Ghosh,et al.  Secure Communication in Cognitive Radio Networks , 2022 .

[9]  Muheet Ahmed Butt,et al.  COGNITIVE RADIO NETWORK: SECURITY ENHANCEMENTS , 2013 .

[10]  Athanasios V. Vasilakos,et al.  Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks , 2015, IEEE Transactions on Computers.

[11]  Athanasios V. Vasilakos,et al.  Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..

[12]  Athanasios V. Vasilakos,et al.  Interoperable and adaptive fuzzy services for ambient intelligence applications , 2010, TAAS.

[13]  Athanasios V. Vasilakos,et al.  CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding , 2012, 2012 Proceedings IEEE INFOCOM.

[14]  Athanasios V. Vasilakos,et al.  Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..

[15]  Athanasios V. Vasilakos,et al.  Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.

[16]  Athanasios V. Vasilakos,et al.  Approximating Congestion + Dilation in Networks via "Quality of Routing" Games , 2012, IEEE Trans. Computers.

[17]  Athanasios V. Vasilakos,et al.  Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.

[18]  Xiaolei Dong,et al.  Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Athanasios V. Vasilakos,et al.  Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks , 2016, IEEE Transactions on Computers.

[20]  Quanyan Zhu,et al.  Dynamic Secure Routing Game in Distributed Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[21]  Athanasios V. Vasilakos,et al.  Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey , 2014, Mobile Networks and Applications.

[22]  Athanasios V. Vasilakos,et al.  QoE-Driven Channel Allocation Schemes for Multimedia Transmission of Priority-Based Secondary Users over Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[23]  Athanasios V. Vasilakos,et al.  Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Athanasios V. Vasilakos,et al.  Backpressure-based routing protocol for DTNs , 2010, SIGCOMM '10.

[25]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[26]  Athanasios V. Vasilakos,et al.  Directional routing and scheduling for green vehicular delay tolerant networks , 2012, Wireless Networks.

[27]  Xiaolei Dong,et al.  4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..

[28]  Athanasios V. Vasilakos,et al.  Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs , 2011, Math. Comput. Model..

[29]  Natarajan Meghanathan,et al.  A Survey on the Communication Protocols and Security in Cognitive Radio Networks , 2013, Int. J. Commun. Networks Inf. Secur..

[30]  A. Prabhakaran,et al.  AN EFFICIENT COMMUNICATION AND SECURITY FOR COGNITIVE RADIO NETWORKS , 2013 .

[31]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[32]  Junaid Qadir,et al.  Artificial intelligence based cognitive routing for cognitive radio networks , 2013, Artificial Intelligence Review.

[33]  Athanasios V. Vasilakos,et al.  EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Wireless Sensor Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[34]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[35]  Athanasios V. Vasilakos,et al.  Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[36]  Athanasios V. Vasilakos,et al.  DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.