Enabling end to end secure communications between source and sink is significant for many
Cognitive Radio Networks (CRNs). While there have been many works devoted to hop by
hop secure communications, the issue of end to end secure communications is largely
ignored. In this paper, an end to end secure communication protocol in randomly deployed
CRNs is designed. Specifically; this protocol is based on a methodology called
differentiated key pre-distribution. The core idea is to distribute different number of keys to
different nodes to enhance the resilience of certain links. This feature is leveraged during
routing, where users route through those links with higher resilience. Using rigorous
theoretical analysis, an expression for the quality of end to end secure communications is
derived and uses it to determine optimum protocol parameters. Extensive performance
evaluation illustrates that the proposed solution can provide highly secure communications
between relays and sink in randomly deployed CRNs.
attacks, differential key pre-distribution,
EGPSR,GPSR, hop by hop communication,
 Eschenauer L, Gligor VD. (2002). A key-management scheme for distributed sensor networks. in Proc. of 9th ACM Conf. Comput. Commun. Security, ACM, NewYork, USA: 41-47.
 Chan H, Perrig A, Song D. (2003). Random key pre distribution schemes for sensor networks. In Proc. IEEE Symp. Research Security Privacy, MA. Kluwer, Norwell: 197-213.
 Du W, Deng J, Han YS, and P. K. Varshney (2005). A pairwise key pre distribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Security 8(2): 228-258.
 Lee J, Stinson DR. (2004). Deterministic key pre distribution schemes for distributed sensor networks. In Proc. 11th Workshop Sel. Areas Cryptography, Waterloo, Canada, 294-307. https://doi.org/10.1007/978-3-540-30564-4_21
 Lee J, Stinson DR. (2005). A combinatorial approach to key pre distribution for distributed sensor networks. in Proc. IEEE Wireless Commun. Netw. Conf., Mar., 13-17. https://doi.org/10.1109/WCNC.2005.1424679
 Liu DG, Ning P. (2005). Establishing pairwise keys in distributed sensor networks. In ACM Trans. Inf. Syst. Security 8(1): 41-77. https://doi.org/10.1145/948109.948119
 Zhu S, Xu S, Setia S, Jajodia S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In Proc. 11th IEEE International Conf. Netw. Protocols, Atlanta, GA, 326-335. https://doi.org/10.1109/ICNP.2003.1249782
 Landstra T, Zawodniok M, Jagannathan S. (2007). Energy-efficient hybrid key management protocol for wireless sensor networks. In IEEE Conf. Local Comput. Netw., Rolla, MO, 559-562. https://doi.org/10.1109/LCN.2007.64
 Gaafar M, Khafagy MG, Amin O, Alouini MS. (2016). Improper Gaussian signaling in Full duplex relay channels with residual self-interference. Proc. IEEE Int. Conf. Commun. (ICC), Kuala Lumpure, May. https://doi.org/10.1109/ICC.2016.7511009
 Sboui L, Ghazzai H, Rezki Z, Alouini MS. (2015). Achievable rate of a cognitive MIMO multiple access channel with multi-secondary users. IEEE Communications Letters (19): 403-406. https://doi.org/10.1109/LCOMM.2014.2387843
 Wang L, Kim KJ, Duong TQ, Elkashlan M, Poor HV. (2015). Security enhancement of cooperative single carrier systems. IEEE Transactions on Wireless Communications 10(1): 90-103. https://doi.org/10.1109/tifs.2014.2360437
 Yang WW, Zhao XH. (2017). Robust resource allocation for orthogonal frequency division multiplexing-based cooperative cognitive radio networks with imperfect CSI. IET Communications 11(2): 273-281. https://doi.org/10.1049/iet-com.2016.0742
 Kim SJ, Soltani N, Giannakis G. (2013). Resource allocation for OFDMA cognitive radios under channel uncertainty. IEEE Transactions on Wireless Communications 12(7): 3578-3587. https://doi.org/10.1109/TWC.2013.062413.121892
 Kailkhura B, Nadendla VSS, Varshney PK. (2015). Distributed inference in the presence of eavesdroppers: A survey. IEEE Communications Magazine 53(6): 40-46. https://doi.org/10.1109/MCOM.2015.7120015
 Elkashlan M, Wang L, Duong TQ, Karagiannidis GK, Nallanathan A. (2015). On the security of cognitive radio networks. IEEE Transactions on Vehicular Technology 64(8): 3790-3795. https://doi.org/10.1109/TVT.2014.2358624
 Cai Y, Mo Y, Ota K, Luo C, Dong M, Yang LT. (2014). Optimal data fusion of collaborative spectrum sensing under attack in cognitive radio networks. IEEE Network 28(1): 17-23. https://doi.org/10.1109/MNET.2014.6724102
 Najimi M, Ebrahimzadeh A, Andargoli S, Fallahi A. (2013). A novel sensing nodes and decision node selection method for energy efficiency of cooperative spectrum sensing in cognitive sensor networks. IEEE Journal on Sensors 13(5): 1610-1621. https://doi.org/10.1109/JSEN.2013.2240900
 Zou Y, Champagne B, Zhu WP, Hanzo L. (2015). Relay-selection improves the security reliability trade-off in cognitive radio systems. IEEE Transactions on Communications 63(1): 215-228. https://doi.org/10.1109/tcomm.2014.2377239
 Deng X, Haimovich AM. (2005). Power allocation for cooperative relaying in wireless networks. IEEE Communication Letters (9): 994-996. https://doi.org/10.1109/LCOMM.2005.11012
 Yang J, Ulukus S. (2012). Optimal packet scheduling in an energy harvesting communication system. IEEE Transactions on Communications 60(1): 220-230. https://doi.org/10.1109/tcomm.2011.112811.100349
 Wu YQ, Hu F, Zhu YY, Kumar S. (2017). Optimal Spectrum handoff control for cognitive radio network based on hybrid priority queuing and multi teacher apprentice learning. IEEE Transactions on Vehicular Technology 66(3): 2630-2642.
 Xu XM, Yang WW, Cai YM. (2017). Opportunistic relay selection improves reliability-reliability tradeoff and security-reliability tradeoff in random cognitive radio networks. IET Communications 11(3): 335-343. https://doi.org/10.1049/iet-com.2016.0702
 Malathi P, Vanathi PT. (2008). OFDM for wireless local area network systems. AMSE Journals, Series Advances B51(1): 1-16, 26.
 Perarasi T, Nagarajan G, Abinaya P. (2016). Controlled channel sharing for Cognitive Radio networks. Australian Journal of basic and applied Sciences 10(12): 82-90, 29.