Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network | Wireless Personal Communications Skip to main content
Log in

Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Routing in cognitive radio networks (CRNs) faces numerous limitations in misbehaving activities and secure the routing requests and reply messages. In this research work, Secure Distance based Improved LEACH Routing (SDILR) protocol is presented to avoid the primary user emulation attack (PUEA) in CRN. Initially, the nodes in the cognitive radio network are clustered by using distance based improved Low- energy adaptive clustering hierarchy (ILEACH). After the formation of clusters, secure routing is presented using support value based signature authentication to avoid PUEA. The proposed secure ILEACH routing results the secure data sharing through the primary user nodes PUEA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Arun, S., & Umamaheswari, G. (2019). An adaptive learning-based attack detection technique for mitigating primary user emulation in cognitive radio networks. Circuits, Systems, and Signal Processing,39, 1071–1088.

    Article  Google Scholar 

  2. Sharifi, M., Sharifi, A. A., & JavadMuseviNiya, M. (2018). Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: Multi-level hypotheses test approach. Wireless Networks,24(1), 61–68.

    Article  Google Scholar 

  3. Venkatesan, K. J. P., & Vijayarangan, V. (2017). Secure and reliable routing in cognitive radio networks. Wireless Networks,23(6), 1689–1696.

    Article  Google Scholar 

  4. Ghanem, W. R., Essam, R., Dessouky, M. (2018). Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks. In Proceedings of the 2018 35th National Radio Science Conference (NRSC) (pp. 309–318). IEEE.

  5. Ta, D.-T., Nguyen-Thanh, N., Maillé, P., & Nguyen, V.-T. (2018). Strategic surveillance against primary user emulation attacks in cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking,4(3), 582–596.

    Article  Google Scholar 

  6. Xie, X., & Wang, W. (2013). Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. Procedia Computer Science,21, 430–435.

    Article  Google Scholar 

  7. Madbushi, S., Raut, R., & Rukmini, M. S. S. (2018). Trust establishment in chaotic cognitive environment to improve attack detection accuracy under primary user emulation. Iranian Journal of Science and Technology, Transactions of Electrical Engineering,42(3), 291–297.

    Article  Google Scholar 

  8. Khaliq, S. B. A., Amjad, M. F., Abbas, H., Shafqat, N., & Afzal, H. (2019). Defence against PUE attacks in ad hoc cognitive radio networks: A mean field game approach. Telecommunication Systems,70(1), 123–140.

    Article  Google Scholar 

  9. Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials,17(2), 1023–1043.

    Article  Google Scholar 

  10. El Alami, H., & Najid, A. (2018). MS-routing-G i: Routing technique to minimise energy consumption and packet loss in WSNs with mobile sink. IET Networks,7(6), 422–428.

    Article  Google Scholar 

  11. Zafar, S., Bashir, A., & Chaudhry, S. A. (2019). Mobility-aware hierarchical clustering in mobile wireless sensor networks. IEEE Access,7, 20394–20403.

    Article  Google Scholar 

  12. Dutta, R., Gupta, S., & Das, M. K. (2014). Improvement on LEACH protocol in wireless sensor networks. International Journal of Computer Applications,97(21), 47–50.

    Google Scholar 

  13. Al-Baz, A., & El-Sayed, A. (2018). A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks. International Journal of Communication Systems,31(1), e3407.

    Article  Google Scholar 

  14. Yousaf, A., Ahmad, F. Hamid, S., & Khan, F. (2019). Performance comparison of various LEACH protocols in wireless sensor networks. In Proceedings of the 2019 IEEE 15th International Colloquium on Signal Processing & Its Applications (CSPA) (pp. 108–113). IEEE.

  15. Kang, J., Sohn, I., & Lee, S. (2019). Enhanced message-passing based LEACH protocol for wireless sensor networks. Sensors,19(1), 75.

    Article  Google Scholar 

  16. Mirza, M. A., Ahmad, M., AsifHabib, M., Mahmood, N., Faisal, C. M. N., & Ahmad, U. (2018). CDCSS: Cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber-attacks. The Journal of Supercomputing,74(10), 5082–5098.

    Article  Google Scholar 

  17. Manohar, A. L., Yau, K.-L. A., Ling, M. H., & Khan, S. (2019). A security-enhanced cluster size adjustment scheme for cognitive radio networks. IEEE Access,7, 117–130.

    Article  Google Scholar 

  18. Manesh, M. R., & Kaabouch, N. (2018). Security threats and countermeasures of MAC layer in cognitive radio networks. Ad Hoc Networks,70, 85–102.

    Article  Google Scholar 

  19. Li, Y., Ma, X., Wang, M., Chen, H., & Xie, L. (2019). Detecting primary user emulation attack based on multipath delay in cognitive radio network. Smart innovations in communication and computational sciences (pp. 361–373). Singapore: Springer.

    Chapter  Google Scholar 

  20. Gupta, I., & Sahu, O. P. (2019). Mitigating Primary user emulation attacks using analytical model. Engineering vibration communication and information processing (pp. 219–227). Singapore: Springer.

    Chapter  Google Scholar 

  21. Behera, T., Samal, U. C., & Mohapatra, S. K. (2018). Energy-efficient modified LEACH protocol for IoT application. IET Wireless Sensor Systems,8(5), 223–228.

    Article  Google Scholar 

  22. Tsai, Y.-R. (2007). Coverage-preserving routing protocols for randomly distributed wireless sensor networks. IEEE Transactions on Wireless Communications,6(4), 1240–1245.

    Article  Google Scholar 

  23. Jiang, Q-m, Chen, H.-F., Xie, L., & Wang, K. (2017). On detecting primary user emulation attack using channel impulse response in the cognitive radio network. Frontiers of Information Technology & Electronic Engineering,18(10), 1665–1676.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chettiyar Vani Vivekanand.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vivekanand, C.V., Bagan, K.B. Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network. Wireless Pers Commun 113, 1823–1837 (2020). https://doi.org/10.1007/s11277-020-07294-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07294-2

Keywords