Security management based on trust determination in cognitive radio networks: Doc 611

Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:EURASIP journal on advances in signal processing 2014-04, Vol.2014, p.1
Hauptverfasser: Li, Jianwu, Feng, Zebing, Wei, Zhiqing, Feng, Zhiyong, Zhang, Ping
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 1
container_title EURASIP journal on advances in signal processing
container_volume 2014
creator Li, Jianwu
Feng, Zebing
Wei, Zhiqing
Feng, Zhiyong
Zhang, Ping
description Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.[PUBLICATION ABSTRACT]
doi_str_mv 10.1186/1687-6180-2014-48
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1528453442</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3315264711</sourcerecordid><originalsourceid>FETCH-proquest_journals_15284534423</originalsourceid><addsrcrecordid>eNqNir0OgjAURhujifjzAG5NnNG2FOhuNA5uupMKV1KUVtuLxreXwTg7nS_nO4QsOFtxrrI1z1QeZ1yxWDAuY6kGJPq54W_nYkwmITSMpZlgIiKHI5SdN_imrba6hhYs0rMOUFFnKfouIK0AwbfGajS9M5aWrrYGzROo15Vx1AK-nL-GGRld9C3A_MspWe62p80-vnv36CBg0bjO2_4qeCqUTBMpRfJf9QEmzES-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1528453442</pqid></control><display><type>article</type><title>Security management based on trust determination in cognitive radio networks: Doc 611</title><source>DOAJ Directory of Open Access Journals</source><source>Springer Nature OA Free Journals</source><source>Springer Nature - Complete Springer Journals</source><source>Alma/SFX Local Collection</source><creator>Li, Jianwu ; Feng, Zebing ; Wei, Zhiqing ; Feng, Zhiyong ; Zhang, Ping</creator><creatorcontrib>Li, Jianwu ; Feng, Zebing ; Wei, Zhiqing ; Feng, Zhiyong ; Zhang, Ping</creatorcontrib><description>Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.[PUBLICATION ABSTRACT]</description><identifier>ISSN: 1687-6172</identifier><identifier>EISSN: 1687-6180</identifier><identifier>DOI: 10.1186/1687-6180-2014-48</identifier><language>eng</language><publisher>New York: Springer Nature B.V</publisher><ispartof>EURASIP journal on advances in signal processing, 2014-04, Vol.2014, p.1</ispartof><rights>The Author(s) 2014</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,860,27903,27904</link.rule.ids></links><search><creatorcontrib>Li, Jianwu</creatorcontrib><creatorcontrib>Feng, Zebing</creatorcontrib><creatorcontrib>Wei, Zhiqing</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><title>Security management based on trust determination in cognitive radio networks: Doc 611</title><title>EURASIP journal on advances in signal processing</title><description>Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.[PUBLICATION ABSTRACT]</description><issn>1687-6172</issn><issn>1687-6180</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqNir0OgjAURhujifjzAG5NnNG2FOhuNA5uupMKV1KUVtuLxreXwTg7nS_nO4QsOFtxrrI1z1QeZ1yxWDAuY6kGJPq54W_nYkwmITSMpZlgIiKHI5SdN_imrba6hhYs0rMOUFFnKfouIK0AwbfGajS9M5aWrrYGzROo15Vx1AK-nL-GGRld9C3A_MspWe62p80-vnv36CBg0bjO2_4qeCqUTBMpRfJf9QEmzES-</recordid><startdate>20140401</startdate><enddate>20140401</enddate><creator>Li, Jianwu</creator><creator>Feng, Zebing</creator><creator>Wei, Zhiqing</creator><creator>Feng, Zhiyong</creator><creator>Zhang, Ping</creator><general>Springer Nature B.V</general><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20140401</creationdate><title>Security management based on trust determination in cognitive radio networks</title><author>Li, Jianwu ; Feng, Zebing ; Wei, Zhiqing ; Feng, Zhiyong ; Zhang, Ping</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_15284534423</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Jianwu</creatorcontrib><creatorcontrib>Feng, Zebing</creatorcontrib><creatorcontrib>Wei, Zhiqing</creatorcontrib><creatorcontrib>Feng, Zhiyong</creatorcontrib><creatorcontrib>Zhang, Ping</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>EURASIP journal on advances in signal processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Jianwu</au><au>Feng, Zebing</au><au>Wei, Zhiqing</au><au>Feng, Zhiyong</au><au>Zhang, Ping</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security management based on trust determination in cognitive radio networks: Doc 611</atitle><jtitle>EURASIP journal on advances in signal processing</jtitle><date>2014-04-01</date><risdate>2014</risdate><volume>2014</volume><spage>1</spage><pages>1-</pages><issn>1687-6172</issn><eissn>1687-6180</eissn><abstract>Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.[PUBLICATION ABSTRACT]</abstract><cop>New York</cop><pub>Springer Nature B.V</pub><doi>10.1186/1687-6180-2014-48</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1687-6172
ispartof EURASIP journal on advances in signal processing, 2014-04, Vol.2014, p.1
issn 1687-6172
1687-6180
language eng
recordid cdi_proquest_journals_1528453442
source DOAJ Directory of Open Access Journals; Springer Nature OA Free Journals; Springer Nature - Complete Springer Journals; Alma/SFX Local Collection
title Security management based on trust determination in cognitive radio networks: Doc 611
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T08%3A03%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20management%20based%20on%20trust%20determination%20in%20cognitive%20radio%20networks:%20Doc%20611&rft.jtitle=EURASIP%20journal%20on%20advances%20in%20signal%20processing&rft.au=Li,%20Jianwu&rft.date=2014-04-01&rft.volume=2014&rft.spage=1&rft.pages=1-&rft.issn=1687-6172&rft.eissn=1687-6180&rft_id=info:doi/10.1186/1687-6180-2014-48&rft_dat=%3Cproquest%3E3315264711%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1528453442&rft_id=info:pmid/&rfr_iscdi=true