CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Spectrum Sensing based Trust Aware Routing for Cognitive Radio Ad hoc Networks (CRAHNs)

by Bosupally Nanda Kumar, K. Jaya Sankar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 43
Year of Publication: 2023
Authors: Bosupally Nanda Kumar, K. Jaya Sankar
10.5120/ijca2023923242

Bosupally Nanda Kumar, K. Jaya Sankar . Spectrum Sensing based Trust Aware Routing for Cognitive Radio Ad hoc Networks (CRAHNs). International Journal of Computer Applications. 185, 43 ( Nov 2023), 36-42. DOI=10.5120/ijca2023923242

@article{ 10.5120/ijca2023923242,
author = { Bosupally Nanda Kumar, K. Jaya Sankar },
title = { Spectrum Sensing based Trust Aware Routing for Cognitive Radio Ad hoc Networks (CRAHNs) },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2023 },
volume = { 185 },
number = { 43 },
month = { Nov },
year = { 2023 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number43/32978-2023923242/ },
doi = { 10.5120/ijca2023923242 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:28:33.232068+05:30
%A Bosupally Nanda Kumar
%A K. Jaya Sankar
%T Spectrum Sensing based Trust Aware Routing for Cognitive Radio Ad hoc Networks (CRAHNs)
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 43
%P 36-42
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Routing in Cognitive Radio Ad hoc Networks (CRAHNs) is a regarded as a challenging task due to the dynamic nature of frequency bands in Cognitive Radio technology. Due to varying frequency bands, the traditional networking routing protocols cannot be applied over CRAHNs. Further, the unavailability of channel information also impacts the network performance. Along with these issues, the presence of adversary nodes and their malicious actions deteriorates the network performance drastically. Hence, this paper introduces a new routing mechanism called as Spectrum Sensing based Trust Aware Routing (SSTAR) for CRAHNs. According to SSTAR, each node subjects to the computation of a trust value, cost associated with channel linked and the probability of the presence of Primary users. SSTAR forms a composite metric is formulated and establishes a secure path for source and destination node pair in the network. Simulation experiments on the proposed SSTAR prove the efficiency in terms of packet delivery ratio, delay and malicious detection rate.

References
  1. Li, J., Feng, Z., Wei, Z., Feng,Z., Zhang,P., "Security management based on trust determination in cognitive radio networks", EURASIP Journal on Advances in Signal Processing, Vol. 2014, No. 1, pp. 48, 2014.
  2. Vivekanand, C. V., Bagan, K.B., "Secure Distance Based Improved Leach Routing to Prevent PUEA in Cognitive Radio Network", Wireless Personal Communications, Vol. 113, pp. 1823-1837, 2020.
  3. Elangovan, K., Subashini, S., "Particle bee optimized convolution neural network for managing security using cross-layer design in cognitive radio network", Journal of Ambient Intelligence and Humanized Computing, pp. 1-9, 2018.
  4. Patnaik, M., Kamakoti, V., Matyáš, V., chák, V., "PROLEMus: A proactive learning-based MAC protocol against PUEA and SSDF attacks in energy constrained cognitive radio networks", IEEE Transactions on Cognitive Communications and Networking, Vol. 5, No. 2, pp. 400-412, 2019.
  5. Guo, J., Zhou, X., "Secure distributed routing algorithm with optimizing energy consumption for cognitive radio networks", Wireless Personal Communications, Vol. 72, No. 4, pp. 2533-2550, 2013.
  6. Nguyen-Thanh, N., Ciblat, P., Pham, A. T., Nguyen, V. T., "Surveillance strategies against primary user emulation attack in cognitive radio networks", IEEE Transactions on Wireless Communications, Vol. 14, No. 9, pp. 4981-4993, 2015.
  7. Jararweh, Y., Salameh, H.A.B., Alturani, A., Tawalbeh, L., and H. Song, "Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks", Telecommunication Systems, Vol. 67, No. 2, pp. 217-229, 2018.
  8. Xin, C., Song, M., "Detection of PUE attacks in cognitive radio networks based on signal activity pattern", IEEE Transactions on Mobile Computing, Vol. 13, No. 5, pp. 1022-1034, 2014.
  9. Karimi, A., Taherpour, A., Cabric, D., "Smart traffic-aware primary user emulation attack and its impact on secondary user throughput under rayleigh flat fading channel", IEEE Transactions on Information Forensics and Security, Vol. 15, No. 1, pp. 66-80, 2019.
  10. Akram, M. W., Salman, M., Shah M. A., Ahmed, M. M., "A review: Security challenges in cognitive radio networks," 2017 23rd International Conference on Automation and Computing (ICAC), Huddersfield, UK, 2017, pp. 1-6, 2017.
  11. Venkataramana B., Jadhav, A., "Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network," 2020 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, pp. 98-102, 2020.
  12. Reddy, V., Rajagopala, R., Linga, R., Sanjeev, "Detection and Prevention of Primary User Emulation Attack in Cognitive Radio Networks Using Secure Hash Algorithm", International Journal of Intelligent Engineering and Systems, Vol. 14, pp. 136-146, 2021.
  13. Jaganathan, R., Vadivel, R., "Bee inspired secured protocol for routing in cognitive radio ad hoc networks", Indian Journal of Science and Technology, Vol. 13, pp. 2159-2169, 2020.
  14. Khasawneh, M., Agarwal, A.,, "A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks", Security and Communication Networks, Vol. 2017, pp. 1-16, 2017.
  15. Akter, S., Rahman, S., Mansoor, N.,, "An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks", arXiv:2008.12895, 2020.
  16. Khan, U., Agrawal, S., Silakari, S., "Detection of malicious nodes (dmn) in vehicular ad-hoc networks", Procedia computer science, Vol. 46, No. 9, pp.965-972, 2015.
  17. Idoudi, H., Mabrouk, O., Minet, P., Saidane, L.A, "Cluster based scheduling for cognitive radio sensor networks", Journal of Ambient Intelligence and Humanized Computing, Vol. 10, No. 2, pp.477-489, 2019.
  18. Cladia, A.T., Rajavel, S.E., "December. Optimizing Spectrum Sensing for Energy Efficient Cognitive Radio Sensor Networks", In 2018International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 333-338, 2018.
  19. Srikanth, A. K., Sudhir, A.Ch., "OT-IDS-CR: Optimal Trusted Intrusion Detection System for Cooperative Spectrum Sensing and Allocation in Cognitive Radio Networks", Eur. Chem. Bull., Vol. 12, No. 5, pp. 2304-2321, 2023.
  20. Jaganathan, R., "Meticulous Elephant Herding Optimization based Protocol for Detecting Intrusions in Cognitive Radio Ad Hoc Networks", International Journal of Emerging Trends in Engineering Research, Vol. 8, pp. 4548-4554, 2020.
  21. Kumari, D.A., "An Efficient Methodology for Detecting Malicious Nodes in Cognitive Radio Networks", Wireless Pers Commun, Vol. 131, pp. 3089-3099, 2023.
  22. Salameh, H. B., Otoum, S., Aloqaily, M., Derbas, R., Ridhawi, I. A., Jararweh, Y., "Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks", Ad Hoc Networks, Vol. 98, pp. 102035, 2020.
  23. Zhong, X., Lu, R., Li L., Zhang, S., "ETOR: Energy and Trust Aware Opportunistic Routing in Cognitive Radio Social Internet of Things," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.
  24. Salameh, H. B., Rawan, D., Aloqaily, M., Boukerche, A., "Secure Routing in Multi-Hop IoT-Based Cognitive Radio Networks under Jamming Attacks", MSWIM '19: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, USA, pp. 323-327, 2019.
  25. Vivekanand, C.V., Bagan, K.B, "Secure Distance Based Improved Leach Routing to Prevent PUEA in Cognitive Radio Network", Wireless Pers Commun, Vol. 113, pp.1823-1837, 2020.
  26. Prasanna Venkatesan, K.J., Vijayarangan, V., "Secure and reliable routing in cognitive radio networks", Wireless Netw, Vol. 23, pp. 1689-1696, 2017.
  27. Elanagai, G., Jayasri, C., "Implementation of network security based data hauling by collaborative spectrum sensing in cognitive radio network", 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, pp. 1-5, 2017.
  28. Singh, A.V., Juyal, V., Saggar, R., "Trust based Intelligent Routing Algorithm for Delay Tolerant Network using Artificial Neural Network", Wireless Netw, Vol. 23, pp. 693-702, 2017.
  29. Geetanjali, Ahmad, F., Kerrache, C. A., Azad, M. A., "A Trust Framework to Detect Malicious Nodes in Cognitive Radio Networks", Electronics, Vol. 8, No.11, pp.1299, 2019.
  30. Yau, K.-L.-A., Ramli, N., Hashim, W., Mohamad, H., "Clustering algorithms for cognitive radio networks: A survey,'' J. Netw. Comput. Appl., Vol. 45, pp. 79-95, Oct. 2014.
  31. Khasawneh, M., Agarwal, A., "A secure and efficient authentication mechanism applied to cognitive radio networks,'' IEEE Access, Vol. 5, pp. 15597-15608, 2017.
  32. Khasawneh, M., Agarwal, A., Goel, N., Zaman, M., Alrabaee, S., "Sureness efficient energy technique for cooperative spectrum sensing in cognitive radios,'' in Proc. Int. Conf. Telecommun. Multimedia (TEMU), Heraklion, Greece, pp. 25-30, Jul. 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cognitive Radio Ad hoc Networks Security Trust Value Spectrum Sensing Routing.