PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks
Cognitive radio network architecture: part II -- trusted network layer structure
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Towards a trust aware cognitive radio architecture
ACM SIGMOBILE Mobile Computing and Communications Review
A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks
CIS '10 Proceedings of the 2010 International Conference on Computational Intelligence and Security
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Trust based security for cognitive radio networks
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
A Combinational Approach for Trust Establishment in Cognitive Radio Networks
CISIS '11 Proceedings of the 2011 International Conference on Complex, Intelligent, and Software Intensive Systems
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks
Proceedings of the 4th international conference on Security of information and networks
A Trust Management Model in Centralized Cognitive Radio Networks
CYBERC '11 Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
A Research Model for Human-Computer Trust Interaction
TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Ensemble Manifold Regularization
IEEE Transactions on Pattern Analysis and Machine Intelligence
Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks
IEEE Transactions on Mobile Computing
A survey of spectrum sensing algorithms for cognitive radio applications
IEEE Communications Surveys & Tutorials
Optimal spectrum sensing framework for cognitive radio networks
IEEE Transactions on Wireless Communications
Cognitive networks: adaptation and learning to achieve end-to-end performance objectives
IEEE Communications Magazine
Hi-index | 0.01 |
In centralized cognitive radio networks (CRNs), the secondary user base station (SUBS), as a fusion center for sensing data, makes spectrum allocation decisions based on the sensing information from secondary users (SUs) around. However, secondary users' changeable environment and easy compromise make the SUBS vulnerable to sensing data falsification and primary user emulation attack, which will mislead its global decision making. In addition, after SUs acquire the right to use spectrum, they may behave maliciously out of selfishness or for other reasons. In this paper, we propose a novel trust management mechanism for CRNs. In the mechanism, we measure the trustworthiness of SUs in spectrum sensing and spectrum use with sensing reputation and etiquette reputation respectively in accordance with the two roles of SUs during the cognition cycle. Spectrum allocation schemes are built based on the two reputations. Specifically, the sensing reputation-based data fusion can effectively reduce the effect of users' malicious behaviors on network decision making. And sensing reputation combined with etiquette reputation to act as the basis for spectrum allocation will encourage SUs to engage in positive and truthful sensing activities and obey spectrum use etiquette. Meanwhile, the probability of spectrum bands being allocated to malicious users will be reduced, which is of great benefit to the enhancement of the fairness and robustness of CRNs. Simulation results show that the sensing reputation-based data fusion can significantly reduce the SUBS' error times in decision making and has strong anti-attack ability. The sensing and etiquette reputation-based multiple-factor resource allocation enables CRNs to adjust the resource allocation strategy flexibly according to the network's requirements on security and profits.