A combinational approach for trust establishment in cognitive radio networks

Cognitive Radio is considered as a promising and demanding technology to examine whether a particular radio spectrum band is currently in use or not and to switch into the temporarily unoccupied spectrum band in order to improve the usage of the radio electromagnetic spectrum without creating interf...

Full description

Bibliographic Details
Main Authors: Parvin, Sazia, Han, Song, Hussain, Farookh Khadeer, Tian, Biming
Other Authors: Leonard Barolli
Format: Conference Paper
Published: Conference Publishing Service 2011
Subjects:
Online Access:http://hdl.handle.net/20.500.11937/19506
_version_ 1848750052071178240
author Parvin, Sazia
Han, Song
Hussain, Farookh Khadeer
Tian, Biming
author2 Leonard Barolli
author_facet Leonard Barolli
Parvin, Sazia
Han, Song
Hussain, Farookh Khadeer
Tian, Biming
author_sort Parvin, Sazia
building Curtin Institutional Repository
collection Online Access
description Cognitive Radio is considered as a promising and demanding technology to examine whether a particular radio spectrum band is currently in use or not and to switch into the temporarily unoccupied spectrum band in order to improve the usage of the radio electromagnetic spectrum without creating interference to the transmissions of other users. Because of the dynamic properties of CRNs, the issue of supporting secure communication in CRNs becomes more critical than that of other conventional wireless networks. In this paper, we propose a combination of certificate-based trust with a behavior-based trust which will benefit both by representing the trust as certificates in the the predeployment trust relation and by providing a continuous behaviour-based evalution of trust.
first_indexed 2025-11-14T07:30:42Z
format Conference Paper
id curtin-20.500.11937-19506
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T07:30:42Z
publishDate 2011
publisher Conference Publishing Service
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-195062023-01-27T05:26:31Z A combinational approach for trust establishment in cognitive radio networks Parvin, Sazia Han, Song Hussain, Farookh Khadeer Tian, Biming Leonard Barolli Fatos Xhafa cognitive radio networks Trust primary user radio security secondary user Cognitive Radio is considered as a promising and demanding technology to examine whether a particular radio spectrum band is currently in use or not and to switch into the temporarily unoccupied spectrum band in order to improve the usage of the radio electromagnetic spectrum without creating interference to the transmissions of other users. Because of the dynamic properties of CRNs, the issue of supporting secure communication in CRNs becomes more critical than that of other conventional wireless networks. In this paper, we propose a combination of certificate-based trust with a behavior-based trust which will benefit both by representing the trust as certificates in the the predeployment trust relation and by providing a continuous behaviour-based evalution of trust. 2011 Conference Paper http://hdl.handle.net/20.500.11937/19506 10.1109/CISIS.2011.40 Conference Publishing Service fulltext
spellingShingle cognitive radio networks
Trust
primary user
radio
security
secondary user
Parvin, Sazia
Han, Song
Hussain, Farookh Khadeer
Tian, Biming
A combinational approach for trust establishment in cognitive radio networks
title A combinational approach for trust establishment in cognitive radio networks
title_full A combinational approach for trust establishment in cognitive radio networks
title_fullStr A combinational approach for trust establishment in cognitive radio networks
title_full_unstemmed A combinational approach for trust establishment in cognitive radio networks
title_short A combinational approach for trust establishment in cognitive radio networks
title_sort combinational approach for trust establishment in cognitive radio networks
topic cognitive radio networks
Trust
primary user
radio
security
secondary user
url http://hdl.handle.net/20.500.11937/19506