期刊文献+

Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks 被引量:1

Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks
下载PDF
导出
摘要 For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks. For the discontinuous occupancy of primary users in cognitive radio networks (CRN), the time-varying of spectrum holes becomes more and more highlighted. In the dynamic environment, cognitive users can access channels that are not occupied by primary users, but they have to hand off to other spectrum holes to continue communication when primary users come back, which brings new security problems. Tracking user attack (TUA) is a typical attack during spectrum handoff, which will invalidate handoff by preventing user accessing, and break down the whole network. In this paper, we propose a Channel Selection Information Hiding scheme (CSIH) to defense TUA. With the proposed scheme, we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.
出处 《China Communications》 SCIE CSCD 2014年第3期125-136,共12页 中国通信(英文版)
基金 the National Natural Science Foundation of China under Grant No.61172068,6137317 0.The Fundamental Research Funds for the Central Universities,Program for New Century Excellent Talents in University
关键词 HANDOFF tracking user attack attack tree 无线电网络 用户访问 信息隐藏 通道选择 攻击树 跟踪 信道选择 时间变化
  • 相关文献

参考文献28

  • 1MITOLA J, III, MAGUIRE G Q, JR. Cognitive Ra- dio: Making Software Radios More Personal [J]. Personal Communications, IEEE, 1999, 6(4): 13- 8.
  • 2JOVlCIC A, VISWANATH R Cognitive Radio: An Information-Theoretic Perspective [J]. Informa-tion Theory, IEEE Transactions on, 2009, 55(9): 3945-58.
  • 3HANIF M F, SMITH P J, TAYLOR D P, et al. MIMO Cognitive Radios with Antenna Selection [J]. Wireless Communications, IEEE Transactions on, 2011, 10(11): 3688-99.
  • 4YUAN Z, GAOCHAO X, XIAOZHONG G. Secu- rity Threats in Cognitive Radio Networks[C]// Proceedings of the 10th IEEE International Con- ference on High Performance Computing and Communications: September 25-27, 2008. Da- lian, China. High Performance Computing and Communications, 2008:1036-1041 .
  • 5CHAO C, HONGBING C, YU-DONG Y. Coop- erative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack [J]. Wireless Communications, IEEE Transactions on, 2011, 10(7): 2135-41.
  • 6FANZI Z, CHEN L, ZHI T. Distributed Compres- sive Spectrum Sensing in Cooperative Multihop Cognitive Networks [J]. Selected Topics in Signal Processing, IEEE Journal of, 2011, 5(1): 37-48.
  • 7GANESAN G, LI Y. Cooperative Spectrum Sens- ing in Cognitive Radio, Part II: Multiuser Net- works [J]. Wireless Communications, IEEE Trans- actions on, 2007, 6(6): 2214-22.
  • 8KUN Z, PAWECZAK P, CABRIC D. Reputa- tion-based Cooperative Spectrum Sensing with Trusted Nodes Assistance [J]. Communications Letters~ IEEE, 2010, 14(3): 226-8.
  • 9EL-SHERIF A A, LIU K J R. Joint Design of Spec- trum Sensing and Channel Access in Cognitive Radio Networks [J]. Wireless Communications, IEEE Transactions on, 2011, 10(6): 1743-53.
  • 10MIN A W, SHIN K G, XIN H. Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation [J]. Mobile Computing~ IEEE Transactions on, 2011, 10(10): 1434-47.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部