Abstract
Routing in cognitive radio networks (CRNs) faces numerous limitations in misbehaving activities and secure the routing requests and reply messages. In this research work, Secure Distance based Improved LEACH Routing (SDILR) protocol is presented to avoid the primary user emulation attack (PUEA) in CRN. Initially, the nodes in the cognitive radio network are clustered by using distance based improved Low- energy adaptive clustering hierarchy (ILEACH). After the formation of clusters, secure routing is presented using support value based signature authentication to avoid PUEA. The proposed secure ILEACH routing results the secure data sharing through the primary user nodes PUEA.









Similar content being viewed by others
References
Arun, S., & Umamaheswari, G. (2019). An adaptive learning-based attack detection technique for mitigating primary user emulation in cognitive radio networks. Circuits, Systems, and Signal Processing,39, 1071–1088.
Sharifi, M., Sharifi, A. A., & JavadMuseviNiya, M. (2018). Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: Multi-level hypotheses test approach. Wireless Networks,24(1), 61–68.
Venkatesan, K. J. P., & Vijayarangan, V. (2017). Secure and reliable routing in cognitive radio networks. Wireless Networks,23(6), 1689–1696.
Ghanem, W. R., Essam, R., Dessouky, M. (2018). Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks. In Proceedings of the 2018 35th National Radio Science Conference (NRSC) (pp. 309–318). IEEE.
Ta, D.-T., Nguyen-Thanh, N., Maillé, P., & Nguyen, V.-T. (2018). Strategic surveillance against primary user emulation attacks in cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking,4(3), 582–596.
Xie, X., & Wang, W. (2013). Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. Procedia Computer Science,21, 430–435.
Madbushi, S., Raut, R., & Rukmini, M. S. S. (2018). Trust establishment in chaotic cognitive environment to improve attack detection accuracy under primary user emulation. Iranian Journal of Science and Technology, Transactions of Electrical Engineering,42(3), 291–297.
Khaliq, S. B. A., Amjad, M. F., Abbas, H., Shafqat, N., & Afzal, H. (2019). Defence against PUE attacks in ad hoc cognitive radio networks: A mean field game approach. Telecommunication Systems,70(1), 123–140.
Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials,17(2), 1023–1043.
El Alami, H., & Najid, A. (2018). MS-routing-G i: Routing technique to minimise energy consumption and packet loss in WSNs with mobile sink. IET Networks,7(6), 422–428.
Zafar, S., Bashir, A., & Chaudhry, S. A. (2019). Mobility-aware hierarchical clustering in mobile wireless sensor networks. IEEE Access,7, 20394–20403.
Dutta, R., Gupta, S., & Das, M. K. (2014). Improvement on LEACH protocol in wireless sensor networks. International Journal of Computer Applications,97(21), 47–50.
Al-Baz, A., & El-Sayed, A. (2018). A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks. International Journal of Communication Systems,31(1), e3407.
Yousaf, A., Ahmad, F. Hamid, S., & Khan, F. (2019). Performance comparison of various LEACH protocols in wireless sensor networks. In Proceedings of the 2019 IEEE 15th International Colloquium on Signal Processing & Its Applications (CSPA) (pp. 108–113). IEEE.
Kang, J., Sohn, I., & Lee, S. (2019). Enhanced message-passing based LEACH protocol for wireless sensor networks. Sensors,19(1), 75.
Mirza, M. A., Ahmad, M., AsifHabib, M., Mahmood, N., Faisal, C. M. N., & Ahmad, U. (2018). CDCSS: Cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber-attacks. The Journal of Supercomputing,74(10), 5082–5098.
Manohar, A. L., Yau, K.-L. A., Ling, M. H., & Khan, S. (2019). A security-enhanced cluster size adjustment scheme for cognitive radio networks. IEEE Access,7, 117–130.
Manesh, M. R., & Kaabouch, N. (2018). Security threats and countermeasures of MAC layer in cognitive radio networks. Ad Hoc Networks,70, 85–102.
Li, Y., Ma, X., Wang, M., Chen, H., & Xie, L. (2019). Detecting primary user emulation attack based on multipath delay in cognitive radio network. Smart innovations in communication and computational sciences (pp. 361–373). Singapore: Springer.
Gupta, I., & Sahu, O. P. (2019). Mitigating Primary user emulation attacks using analytical model. Engineering vibration communication and information processing (pp. 219–227). Singapore: Springer.
Behera, T., Samal, U. C., & Mohapatra, S. K. (2018). Energy-efficient modified LEACH protocol for IoT application. IET Wireless Sensor Systems,8(5), 223–228.
Tsai, Y.-R. (2007). Coverage-preserving routing protocols for randomly distributed wireless sensor networks. IEEE Transactions on Wireless Communications,6(4), 1240–1245.
Jiang, Q-m, Chen, H.-F., Xie, L., & Wang, K. (2017). On detecting primary user emulation attack using channel impulse response in the cognitive radio network. Frontiers of Information Technology & Electronic Engineering,18(10), 1665–1676.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Vivekanand, C.V., Bagan, K.B. Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network. Wireless Pers Commun 113, 1823–1837 (2020). https://doi.org/10.1007/s11277-020-07294-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07294-2