Abstract
In this paper, we consider a cognitive radio network which consists of a secondary transmitter (ST), secondary destination (SD) and multiple secondary radios along with the existence of eavesdropper. Here, we proposed a relay selection schemes for the improvement of security. If the number of relays is increased then the security of cognitive radio (CR) transmission approaches to significantly improve and the chances of a data breach are low in the presence of an eavesdropper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
J. Mitola, G.Q. Maguire, Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)
IEEE 802.22 Working Group, IEEE P802.22/D1.0 draft standard for wireless regional area networks part 22: cognitive wireless RAN medium access control (MAC) and physical layer (PHY) specifications: policies and procedures for operation in the TV bands, Apr 2008
G. Baldini, T. Sturman, A.R. Biswas, R. Leschhorn, Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun. Surveys Tuts. 14(2), 355–379 (2012)
D. Cabric, S. M. Mishra, R.W. Brodersen, Implementation issues in spectrum sensing for cognitive radios, in Proceedings 38th Asilomar Conference Signal, Systems Computers, Pacific Grove, CA, USA (Nov 2004), pp. 772–776
H. Li, Cooperative spectrum sensing via belief propagation in spectrum heterogeneous cognitive radio systems, in Proceedings IEEE WCNC, Sydney, N.S.W., Australia (Apr. 2010), p. 1
J. Ma, G. Zhao, Y. Li, Soft combination and detection for cooperative spectrum sensing in cognitive radio networks. IEEE Trans. Wireless Commun. 7(11), 4502–4507 (2008)
A. Ghasemi, E.S. Sousa, Fundamental limits of spectrum-sharing in fading environments. IEEE Trans. Wireless Commun. 6(2), 649–658 (2007)
R. Southwell, J. Huang, X. Liu, Spectrum mobility games, in Proceedings 31st INFOCOM, Orlando, FL, USA (Mar 2012), pp. 37–45
I.F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty, A survey on spectrum management in cognitive radio networks. IEEE Commun. Mag. 46(4), 40–48 (2008)
H. Li, Z. Han, Dogfight in spectrum: combating primary user emulation attacks in cognitive radio systems part I: known channel statistics. IEEE Trans. Wireless Commun. 9(11), 3566–3577
T. Brown, A. Sethi, Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment, in Proceedings of the 2nd International Conference CROWNCOM, Orlando, FL, USA (Aug 2007), pp. 456–464
A. Mukherjee, S.A. Fakoorian, J. Huang, A.L. Swindlehurst, Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surveys Tuts. 16(3), 1550–1573 (2014)
Z. Shu, Y. Qian, S. Ci, On physical layer security for cognitive radio networks. IEEE Netw. Mag. 27(3), 28–33 (2013)
Y. Pei, Y.-C. Liang, K.C. Teh, K. Li, Secure communication in multiantenna cognitive radio networks with imperfect channel state information. IEEE Trans. Signal Process. 59(4), 1683–1693 (2011)
S. Lakshmanan, C. Tsao, R. Sivakumar, K. Sundaresan, Securing wireless data networks against eavesdropping using smart antennas, in Proceedings of the 28th ICDCS, Beijing, China (June 2008), pp. 19–27
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Eppe, B.P., Inturi, V.K., Boddu, Y.C., Kumar, K.R., Didla, R.D.S. (2018). Improvement of Security in CR Networks Using Relay Selection. In: Dash, S., Naidu, P., Bayindir, R., Das, S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 668. Springer, Singapore. https://doi.org/10.1007/978-981-10-7868-2_37
Download citation
DOI: https://doi.org/10.1007/978-981-10-7868-2_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7867-5
Online ISBN: 978-981-10-7868-2
eBook Packages: EngineeringEngineering (R0)