Trusted cognitive radio networking

被引:14
作者
Chen, Kwang-Cheng [1 ,2 ]
Chen, Peng-Yu [3 ]
Prasad, Neeli [3 ]
Liang, Ying-Chang [4 ]
Sun, Sumei [4 ]
机构
[1] Natl Taiwan Univ, Inst Commun Engn, Taipei 10764, Taiwan
[2] Natl Taiwan Univ, Dept Elect Engn, Taipei 10764, Taiwan
[3] Univ Aalborg, Ctr TeleInFrastruktur, Aalborg, Denmark
[4] ASTAR, Inst Infocom Res, Singapore, Singapore
关键词
cognitive radio; cognitive radio networks; trust; trusted networking; cognitive radio network architecture; statistical decision; AD HOC NETWORKS;
D O I
10.1002/wcm.777
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networking cognitive radios and nodes from primary system (PS) results in a heterogeneous coexisting multiradio wireless network, so that significant network throughput gain can be achieved. However, by investigating cognitive radio network (CRN) architecture, the links in CRNs are unlikely to support complete security check due to link dynamics, opportunistic availability, and uni-directional in available time window. We therefore introduce trusted cognitive radio networking (TCRN) concept to facilitate network functions such as association in dynamic spectrum access and routing. First of all, we explore the mathematical framework for trust in CRNs. We then show successful association of node to CRN based on the mathematical structure of trust from statistical decision theory. Furthermore, we modify the machine-learning algorithm to update the trust measure for each node, and develop rules of thumbs to facilitate TCRN with learning capability, based on numerical simulations. Trusted CRN can greatly alleviate heterogeneous challenge for CRN operation. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:467 / 485
页数:19
相关论文
共 26 条
[1]  
[Anonymous], P IEEE WIC INT C WEB
[2]  
[Anonymous], 2002, 15 BLED EL COMM C BL
[3]  
[Anonymous], PHYS COMMUN
[4]  
Berger J.O., 1985, Statistical decision theory and Bayesian analysis, V2nd
[5]  
Chan H., 2003, P IEEE S SEC PRIV
[6]  
Chen K. C., 2008, P ACM INT C UB INF M
[7]  
CHEN KC, 2007, P WIR PERS MULT COMM
[8]  
CHEN KC, WIRELESS CO IN PRESS
[9]  
Clarke D., 2001, Journal of Computer Security, V9, P285
[10]  
ESCHENAUER L, 2002, P ACM CCS NOV