scholarly journals A Repeated Games-Based Secure Multiple-Channels Communications Scheme for Secondary Users with Randomly Attacking Eavesdroppers

2019 ◽  
Vol 9 (5) ◽  
pp. 868 ◽  
Author(s):  
Van-Hiep Vu ◽  
Huynh Thien ◽  
Insoo Koo

The cognitive radio network (CRN) is vulnerable to various newly-arising attacks targeting the weaknesses of cognitive radio (CR) communication and networking. In this paper, we focus on improving the secrecy performance of CR communications in a decentralized, multiple-channel manner while various eavesdroppers (EVs) try to listen to their private information. By choosing the best channel, the secondary user (SU) aims at mitigating the effects of eavesdropping and other SUs that compete for the same channel. Accordingly, the problem of finding the best channel that maximizes the secrecy rate for the SU is formulated as the framework of multiple repeated games where both the SU and the EVs try to maximize their own performance. In this case, the secrecy rate of an SU is defined based on the expected rewards of the SUs and the EVs. In the paper, we propose a repeated games-based scheme that can provide the best channel for the SU to avoid eavesdropping attacks and also minimize interference from other SUs that compete for the same channel. The simulation results demonstrate that the proposed scheme can combat a physical layer attack from EVs quite well and can provide much better performance, in comparison with other conventional channel selection schemes.

Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1260
Author(s):  
Hyils Sharon Magdalene Antony ◽  
Thulasimani Lakshmanan

Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. However, the system is an exceptional way for the cognitive users to secure a communication from the interferences in multiple-input multiple-output (MIMO)-NOMA-based cognitive radio network. In this article, a new beamforming technique is proposed to secure an information exchange within the same cells and neighboring cells from all intervened users. The interference is caused by an imperfect spectrum sensing of the secondary users (SUs). The SUs are intended to access the primary channels. At the same time, the primary user also returns to the channel before the SUs access ends. This similar way of accessing the primary channel will cause interference between the users. Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive radio network. The simulation result provides better evidence for the performance of the proposed technique.


2014 ◽  
Vol 2014 ◽  
pp. 1-6
Author(s):  
Hiep Vu-Van ◽  
Insoo Koo

Cognitive radio (CR) is a promising technology for improving usage of frequency band. Cognitive radio users (CUs) are allowed to use the bands without interference in operation of licensed users. Reliable sensing information about status of licensed band is a prerequirement for CR network. Cooperative spectrum sensing (CSS) is able to offer an improved sensing reliability compared to individual sensing. However, the sensing performance of CSS can be destroyed due to the appearance of some malicious users. In this paper, we propose a goodness-of-fit (GOF) based cooperative spectrum sensing scheme to detect the dissimilarity between sensing information of normal CUs and that of malicious users, and reject their harmful effect to CSS. The empirical CDF will be used in GOF test to determine the measured distance between distributions of observation sample set according to each hypothesis of licensed user signal. Further, the DS theory is used to combine results of multi-GOF tests. The simulation results demonstrate that the proposed scheme can protect the sensing process against the attack from malicious users.


Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


Sign in / Sign up

Export Citation Format

Share Document