Secured Communications in Cognitive Radio Networks

Secured Communications in Cognitive Radio Networks

T. PerarasiG. Nagarajan 

Department of ECE, Pondicherry Engineering College, Puducherry 605 104, India

Corresponding Author Email:
22 March 2018
15 June 2018
31 December 2018
| Citation



Enabling end to end secure communications between source and sink is significant for many

Cognitive Radio Networks (CRNs). While there have been many works devoted to hop by

hop secure communications, the issue of end to end secure communications is largely

ignored. In this paper, an end to end secure communication protocol in randomly deployed

CRNs is designed. Specifically; this protocol is based on a methodology called

differentiated key pre-distribution. The core idea is to distribute different number of keys to

different nodes to enhance the resilience of certain links. This feature is leveraged during

routing, where users route through those links with higher resilience. Using rigorous

theoretical analysis, an expression for the quality of end to end secure communications is

derived and uses it to determine optimum protocol parameters. Extensive performance

evaluation illustrates that the proposed solution can provide highly secure communications

between relays and sink in randomly deployed CRNs.


attacks, differential key pre-distribution,

EGPSR,GPSR, hop by hop communication,

routing protocol

1. Introduction
2. Existing System
3. Proposed Method
4. Results and Discussion
5. Conclusion

[1] Eschenauer L, Gligor VD. (2002). A key-management scheme for distributed sensor networks. in Proc. of 9th ACM Conf. Comput. Commun. Security, ACM, NewYork, USA: 41-47.

[2] Chan H, Perrig A, Song D. (2003). Random key pre distribution schemes for sensor networks. In Proc. IEEE Symp. Research Security Privacy, MA. Kluwer, Norwell: 197-213.

[3] Du W, Deng J, Han YS, and P. K. Varshney (2005). A pairwise key pre distribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Security 8(2): 228-258.

[4] Lee J, Stinson DR. (2004). Deterministic key pre distribution schemes for distributed sensor networks. In Proc. 11th Workshop Sel. Areas Cryptography, Waterloo, Canada, 294-307.

[5] Lee J, Stinson DR. (2005). A combinatorial approach to key pre distribution for distributed sensor networks. in Proc. IEEE Wireless Commun. Netw. Conf., Mar., 13-17.

[6] Liu DG, Ning P. (2005). Establishing pairwise keys in distributed sensor networks. In ACM Trans. Inf. Syst. Security 8(1): 41-77.

[7] Zhu S, Xu S, Setia S, Jajodia S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In Proc. 11th IEEE International Conf. Netw. Protocols, Atlanta, GA, 326-335.

[8] Landstra T, Zawodniok M, Jagannathan S. (2007). Energy-efficient hybrid key management protocol for wireless sensor networks. In IEEE Conf. Local Comput. Netw., Rolla, MO, 559-562.

[9] Gaafar M, Khafagy MG, Amin O, Alouini MS. (2016). Improper Gaussian signaling in Full duplex relay channels with residual self-interference. Proc. IEEE Int. Conf. Commun. (ICC), Kuala Lumpure, May.

[10] Sboui L, Ghazzai H, Rezki Z, Alouini MS. (2015). Achievable rate of a cognitive MIMO multiple access channel with multi-secondary users. IEEE Communications Letters (19): 403-406.

[11] Wang L, Kim KJ, Duong TQ, Elkashlan M, Poor HV. (2015). Security enhancement of cooperative single carrier systems. IEEE Transactions on Wireless Communications 10(1): 90-103.

[12] Yang WW, Zhao XH. (2017). Robust resource allocation for orthogonal frequency division multiplexing-based cooperative cognitive radio networks with imperfect CSI. IET Communications 11(2): 273-281.

[13] Kim SJ, Soltani N, Giannakis G. (2013). Resource allocation for OFDMA cognitive radios under channel uncertainty. IEEE Transactions on Wireless Communications 12(7): 3578-3587.

[14] Kailkhura B, Nadendla VSS, Varshney PK. (2015). Distributed inference in the presence of eavesdroppers: A survey. IEEE Communications Magazine 53(6): 40-46.

[15] Elkashlan M, Wang L, Duong TQ, Karagiannidis GK, Nallanathan A. (2015). On the security of cognitive radio networks. IEEE Transactions on Vehicular Technology 64(8): 3790-3795.

[16] Cai Y, Mo Y, Ota K, Luo C, Dong M, Yang LT. (2014). Optimal data fusion of collaborative spectrum sensing under attack in cognitive radio networks. IEEE Network 28(1): 17-23.

[17] Najimi M, Ebrahimzadeh A, Andargoli S, Fallahi A. (2013). A novel sensing nodes and decision node selection method for energy efficiency of cooperative spectrum sensing in cognitive sensor networks. IEEE Journal on Sensors 13(5): 1610-1621.

[18] Zou Y, Champagne B, Zhu WP, Hanzo L. (2015). Relay-selection improves the security reliability trade-off in cognitive radio systems. IEEE Transactions on Communications 63(1): 215-228.

[19] Deng X, Haimovich AM. (2005). Power allocation for cooperative relaying in wireless networks. IEEE Communication Letters (9): 994-996.

[20] Yang J, Ulukus S. (2012). Optimal packet scheduling in an energy harvesting communication system. IEEE Transactions on Communications 60(1): 220-230.

[21] Wu YQ, Hu F, Zhu YY, Kumar S. (2017). Optimal Spectrum handoff control for cognitive radio network based on hybrid priority queuing and multi teacher apprentice learning. IEEE Transactions on Vehicular Technology 66(3): 2630-2642.

[22] Xu XM, Yang WW, Cai YM. (2017). Opportunistic relay selection improves reliability-reliability tradeoff and security-reliability tradeoff in random cognitive radio networks. IET Communications 11(3): 335-343.

[23] Malathi P, Vanathi PT. (2008). OFDM for wireless local area network systems. AMSE Journals, Series Advances B51(1): 1-16, 26.

[24] Perarasi T, Nagarajan G, Abinaya P. (2016). Controlled channel sharing for Cognitive Radio networks. Australian Journal of basic and applied Sciences 10(12): 82-90, 29.