Cargando…
Using Trust to Establish a Secure Routing Model in Cognitive Radio Network
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes’ forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based mod...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4589414/ https://www.ncbi.nlm.nih.gov/pubmed/26421843 http://dx.doi.org/10.1371/journal.pone.0139326 |
_version_ | 1782392789516943360 |
---|---|
author | Zhang, Guanghua Chen, Zhenguo Tian, Liqin Zhang, Dongwen |
author_facet | Zhang, Guanghua Chen, Zhenguo Tian, Liqin Zhang, Dongwen |
author_sort | Zhang, Guanghua |
collection | PubMed |
description | Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes’ forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes’ trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack. |
format | Online Article Text |
id | pubmed-4589414 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-45894142015-10-02 Using Trust to Establish a Secure Routing Model in Cognitive Radio Network Zhang, Guanghua Chen, Zhenguo Tian, Liqin Zhang, Dongwen PLoS One Research Article Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes’ forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes’ trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack. Public Library of Science 2015-09-30 /pmc/articles/PMC4589414/ /pubmed/26421843 http://dx.doi.org/10.1371/journal.pone.0139326 Text en © 2015 Zhang et al http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited. |
spellingShingle | Research Article Zhang, Guanghua Chen, Zhenguo Tian, Liqin Zhang, Dongwen Using Trust to Establish a Secure Routing Model in Cognitive Radio Network |
title | Using Trust to Establish a Secure Routing Model in Cognitive Radio Network |
title_full | Using Trust to Establish a Secure Routing Model in Cognitive Radio Network |
title_fullStr | Using Trust to Establish a Secure Routing Model in Cognitive Radio Network |
title_full_unstemmed | Using Trust to Establish a Secure Routing Model in Cognitive Radio Network |
title_short | Using Trust to Establish a Secure Routing Model in Cognitive Radio Network |
title_sort | using trust to establish a secure routing model in cognitive radio network |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4589414/ https://www.ncbi.nlm.nih.gov/pubmed/26421843 http://dx.doi.org/10.1371/journal.pone.0139326 |
work_keys_str_mv | AT zhangguanghua usingtrusttoestablishasecureroutingmodelincognitiveradionetwork AT chenzhenguo usingtrusttoestablishasecureroutingmodelincognitiveradionetwork AT tianliqin usingtrusttoestablishasecureroutingmodelincognitiveradionetwork AT zhangdongwen usingtrusttoestablishasecureroutingmodelincognitiveradionetwork |