Secure Distributed Spectrum Sensing in Cognitive Radio Networks

  • Anandakumar Haldorai
  • Umamaheswari Kandaswamy
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)


The critical requirement of the Cognitive Radio Networks (CRNs) is to enhance the accessibility of the spectrum in a manner that envisions utility of the spectrum holes by the Secondary Users (SUs) when the Primary Users (PUs), who are licensed, do not use the holes. The ability to identify the PUs and the spectrum holes is facilitated by the aspect of distributed spectrum sensing. Spectrum selection and sensing of the protocols necessitates ensuring that the PUs are rendered harmless or interfered with, including the assurance that the protocols are not subjected to modification in the primary signals. In that case, the secondary users need to follow the cognitive radio protocols and regulations, which is determined by the securing of the Distributed Spectrum Sensing (DSS) and selection protocols aiding in the provision of two fundamental cognitive radio network protocols. This contribution targets at evaluating the spectrum sensing and selection protocols by investigating critically into the distributed safe cooperating sensing scheme. Literature shows that there might be a security risk on the CRNs caused by an attacker to influence the provision of services, commonly referred as Denial of Services (DoSs). Thus, cryptographic security is necessary for distributed spectrum sensing and protocols in assuring the persistence of primary users services in cognitive radio networks.


Distributed Spectrum Sensing (DSS) Cognitive Radio Networks (CRNs) Signal noise ratio (SNR) Primary users (PUs) Secondary users (SUs) 


  1. 1.
    Lin, H., Hu, J., Huang, C., Xu, L., Wu, B.: Secure cooperative spectrum sensing and allocation in distributed cognitive radio networks. Int. J. Distribut. Sens. Netw. 1–12 (2015)CrossRefGoogle Scholar
  2. 2.
    Anandakumar, H., Umamaheswari, K.: An efficient optimized handover in cognitive radio networks using cooperative spectrum sensing. Intell. Autom. Soft Comput. 1–8 (2017)Google Scholar
  3. 3.
    Anandakumar, H., Arulmurugan, R., Onn, C.C.: Computational intelligence and sustainable systems. In: EAI/Springer Innovations in Communication and Computing (2019)Google Scholar
  4. 4.
    Soto, J., Nogueira, M.: A framework for resilient and secure spectrum sensing on cognitive radio networks. Comput. Netw. 79, 313–322 (2015)CrossRefGoogle Scholar
  5. 5.
    Taghavi, E., Abolhassani, B.: A two step secure spectrum sensing algorithm using fuzzy logic for cognitive radio networks. Int. J. Commun. Netw. Syst. Sci. 4(8), 507–513 (2011)Google Scholar
  6. 6.
    Wang, D., Ren, P., Du, Q., Sun, L., Wang, Y.: Reciprocally-benefited secure transmission for spectrum sensing-based cognitive radio sensor networks. Sensors. 16(12), 1998 (2016)CrossRefGoogle Scholar
  7. 7.
    Anandakumar, H., Umamaheswari, K.: Energy efficient network selection using 802.16g based GSM technology. J. Comput. Sci. 10(5), 745–754 (2014)CrossRefGoogle Scholar
  8. 8.
    Anandakumar, H., Umamaheswari, K.: Cooperative spectrum handovers in cognitive radio networks. In: EAI/Springer Innovations in Communication and Computing, pp. 47–63 (2018)Google Scholar
  9. 9.
    Yadav, R., Kumar, A., Singh, K.: Green power allocation for cognitive radio networks with spectrum sensing. IEEJ Trans. Electr. Electr. Eng. (2018)Google Scholar
  10. 10.
    Liu, X., Jia, M., Tan, X.: Threshold optimization of cooperative spectrum sensing in cognitive radio networks. Radio Sci. 48(1), 23–32 (2013)CrossRefGoogle Scholar
  11. 11.
    Kim, M., Chung, M., Choo, H.: VeriEST: verification via primary user emulation signal-based test for secure distributed spectrum sensing in cognitive radio networks. Secur. Commun. Netw. 5(7), 776–788 (2011)CrossRefGoogle Scholar
  12. 12.
    Suganya, M., Anandakumar, H.: Handover based spectrum allocation in cognitive radio networks. In: 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), Chennai, pp. 215–219 (2013)Google Scholar
  13. 13.
    Anandakumar, H., Umamaheswari, K.: A bio-inspired swarm intelligence technique for social aware cognitive radio handovers. Comput. Electr. Eng. 71, 925–937 (2018)CrossRefGoogle Scholar
  14. 14.
    Anandakumar, H., Umamaheswari, K.: Supervised machine learning techniques in cognitive radio networks during cooperative spectrum handovers. Clust. Comput. 20(2), 1505–1515 (2017)CrossRefGoogle Scholar
  15. 15.
    Haldorai, A., Ramu, A.: Cognitive social mining applications in data analytics and forensics. In: Advances in Social Networking and Online Communities (2019)Google Scholar
  16. 16.
    Jones, R., Veendorp, E.: Cooperative moves in a non-cooperative game. Global Business Econ. Rev. 7(1), 25 (2005)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Anandakumar Haldorai
    • 1
  • Umamaheswari Kandaswamy
    • 2
  1. 1.Department of Computer Science and EngineeringSri Eshwar College of EngineeringCoimbatoreIndia
  2. 2.Department of Information TechnologyPSG College of TechnologyCoimbatoreIndia

Personalised recommendations