Using trust to establish a secure routing model in cognitive radio network

11Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

Cite

CITATION STYLE

APA

Zhang, G., Chen, Z., Tian, L., & Zhang, D. (2015). Using trust to establish a secure routing model in cognitive radio network. PLoS ONE, 10(9). https://doi.org/10.1371/journal.pone.0139326

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free