Security management based on trust determination in cognitive radio networks: Doc 611
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive...
Gespeichert in:
Veröffentlicht in: | EURASIP journal on advances in signal processing 2014-04, Vol.2014, p.1 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 1 |
container_title | EURASIP journal on advances in signal processing |
container_volume | 2014 |
creator | Li, Jianwu Feng, Zebing Wei, Zhiqing Feng, Zhiyong Zhang, Ping |
description | Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.[PUBLICATION ABSTRACT] |
doi_str_mv | 10.1186/1687-6180-2014-48 |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1528453442</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3315264711</sourcerecordid><originalsourceid>FETCH-proquest_journals_15284534423</originalsourceid><addsrcrecordid>eNqNir0OgjAURhujifjzAG5NnNG2FOhuNA5uupMKV1KUVtuLxreXwTg7nS_nO4QsOFtxrrI1z1QeZ1yxWDAuY6kGJPq54W_nYkwmITSMpZlgIiKHI5SdN_imrba6hhYs0rMOUFFnKfouIK0AwbfGajS9M5aWrrYGzROo15Vx1AK-nL-GGRld9C3A_MspWe62p80-vnv36CBg0bjO2_4qeCqUTBMpRfJf9QEmzES-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1528453442</pqid></control><display><type>article</type><title>Security management based on trust determination in cognitive radio networks: Doc 611</title><source>DOAJ Directory of Open Access Journals</source><source>Springer Nature OA Free Journals</source><source>Springer Nature - Complete Springer Journals</source><source>Alma/SFX Local Collection</source><creator>Li, Jianwu ; Feng, Zebing ; Wei, Zhiqing ; Feng, Zhiyong ; Zhang, Ping</creator><creatorcontrib>Li, Jianwu ; Feng, Zebing ; Wei, Zhiqing ; Feng, Zhiyong ; Zhang, Ping</creatorcontrib><description>Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.[PUBLICATION ABSTRACT]</description><identifier>ISSN: 1687-6172</identifier><identifier>EISSN: 1687-6180</identifier><identifier>DOI: 10.1186/1687-6180-2014-48</identifier><language>eng</language><publisher>New York: Springer Nature B.V</publisher><ispartof>EURASIP journal on advances in signal processing, 2014-04, Vol.2014, p.1</ispartof><rights>The Author(s) 2014</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,860,27903,27904</link.rule.ids></links><search><creatorcontrib>Li, Jianwu</creatorcontrib><creatorcontrib>Feng, Zebing</creatorcontrib><creatorcontrib>Wei, Zhiqing</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><title>Security management based on trust determination in cognitive radio networks: Doc 611</title><title>EURASIP journal on advances in signal processing</title><description>Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.[PUBLICATION ABSTRACT]</description><issn>1687-6172</issn><issn>1687-6180</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqNir0OgjAURhujifjzAG5NnNG2FOhuNA5uupMKV1KUVtuLxreXwTg7nS_nO4QsOFtxrrI1z1QeZ1yxWDAuY6kGJPq54W_nYkwmITSMpZlgIiKHI5SdN_imrba6hhYs0rMOUFFnKfouIK0AwbfGajS9M5aWrrYGzROo15Vx1AK-nL-GGRld9C3A_MspWe62p80-vnv36CBg0bjO2_4qeCqUTBMpRfJf9QEmzES-</recordid><startdate>20140401</startdate><enddate>20140401</enddate><creator>Li, Jianwu</creator><creator>Feng, Zebing</creator><creator>Wei, Zhiqing</creator><creator>Feng, Zhiyong</creator><creator>Zhang, Ping</creator><general>Springer Nature B.V</general><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20140401</creationdate><title>Security management based on trust determination in cognitive radio networks</title><author>Li, Jianwu ; Feng, Zebing ; Wei, Zhiqing ; Feng, Zhiyong ; Zhang, Ping</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_15284534423</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Jianwu</creatorcontrib><creatorcontrib>Feng, Zebing</creatorcontrib><creatorcontrib>Wei, Zhiqing</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>EURASIP journal on advances in signal processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Jianwu</au><au>Feng, Zebing</au><au>Wei, Zhiqing</au><au>Feng, Zhiyong</au><au>Zhang, Ping</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security management based on trust determination in cognitive radio networks: Doc 611</atitle><jtitle>EURASIP journal on advances in signal processing</jtitle><date>2014-04-01</date><risdate>2014</risdate><volume>2014</volume><spage>1</spage><pages>1-</pages><issn>1687-6172</issn><eissn>1687-6180</eissn><abstract>Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.[PUBLICATION ABSTRACT]</abstract><cop>New York</cop><pub>Springer Nature B.V</pub><doi>10.1186/1687-6180-2014-48</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1687-6172 |
ispartof | EURASIP journal on advances in signal processing, 2014-04, Vol.2014, p.1 |
issn | 1687-6172 1687-6180 |
language | eng |
recordid | cdi_proquest_journals_1528453442 |
source | DOAJ Directory of Open Access Journals; Springer Nature OA Free Journals; Springer Nature - Complete Springer Journals; Alma/SFX Local Collection |
title | Security management based on trust determination in cognitive radio networks: Doc 611 |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T08%3A03%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20management%20based%20on%20trust%20determination%20in%20cognitive%20radio%20networks:%20Doc%20611&rft.jtitle=EURASIP%20journal%20on%20advances%20in%20signal%20processing&rft.au=Li,%20Jianwu&rft.date=2014-04-01&rft.volume=2014&rft.spage=1&rft.pages=1-&rft.issn=1687-6172&rft.eissn=1687-6180&rft_id=info:doi/10.1186/1687-6180-2014-48&rft_dat=%3Cproquest%3E3315264711%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1528453442&rft_id=info:pmid/&rfr_iscdi=true |