Research Article

Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks

Volume: 17 Number: 2 July 15, 2025
EN TR

Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks

Abstract

Cognitive radio networks are an up-to-date technology that generally used for wireless communication. In cognitive radio networks, there are primary users and secondary users. Secondary users aim to opportunistically use the empty spectrum of licensed primary users. Thus, the spectrum is used efficiently. While the secondary user is using the primary user's empty spectrum, the primary user may need to use the spectrum. In this case, spectrum handoff is defined as the secondary user continues its communication by switching to a different spectrum. In this study, secure information transmission has been made in cognitive radio networks using the proactive spectrum handoff approach that is one of the spectrum handoff techniques. In the proactive spectrum handoff process, the frequency bands to be transferred are predetermined and unauthorized access to information is prevented.

Keywords

Information Security, Cognitive Radio, Proactive Approach, Spectrum Handoff

References

  1. Akram M. W., Salman M., Shah M. A. and Ahmed M. M., (2017). A review: Security challenges in cognitive radio networks. 23rd International Conference on Automation and Computing (ICAC). Huddersfield, pp. 1-6. doi: 10.23919/IConAC.2017.8082089.
  2. Dey S., Saha M. I. (2023) A novel spectrum handoff switching decision scheme for improved performance of secondary users in cognitive radio network. Int J Commun Syst., 36(4),e5413. doi:10.1002/dac.5413
  3. Hamood A. S. and Sadkhan S. B., (2017). Cognitive radio network security status and challenges. Annual Conference on New Trends in Information & Communications Technology Applications (NTICT). Baghdad, pp. 1-6. doi: 10.1109/NTICT.2017.7976105.
  4. Kundu, A., Arif, W. (2024) Analysis of Bayesian game theoretic approach for the target channel selection of secondary user under heterogeneous cognitive radio network. Telecommun Syst. https://doi.org/10.1007/s11235-024-01118-5
  5. Mishra N., Srivastava S. and Sharan S. N., (2019). Cognitive Radio Network Security Threats: A Review. 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT). Jaipur, India, pp. 333-338. doi:10.1109/ICCT46177.2019.8969053.
  6. Pham-Thi-Dan N., Ho-Van K., Do-Dac T., Vo-Que S. and Pham-Ngoc S., (2019). Energy Harvesting Cooperative Cognitive Networks: Relay Selection for Information Security. International Symposium on Electrical and Electronics Engineering (ISEE). Ho Chi Minh, Vietnam, pp. 1-4. doi: 10.1109/ISEE2.2019.8921231.
  7. Priyadarshi, R., Kumar, R.R. & Ying, Z. (2024) Techniques employed in distributed cognitive radio networks: a survey on routing intelligence. Multimed Tools Appl. https://doi.org/10.1007/s11042-024-19054-6
  8. Raj S. and Sahu O. P., (2017). Security Threats and Challenges on Different Protocol Layers in Cognitive Radio Networks: An Overview. International Conference on Innovations in Control, Communication and Information Systems (ICICCI). Greater Noida, India, pp. 1-5. doi: 10.1109/ICICCIS.2017.8660761.
  9. Sadkhan S. B. and Reda D. M., (2019). Security Issues of Cognitive Radio Network. 2nd International Conference on Engineering Technology and its Applications (IICETA). Al-Najef, Iraq, pp. 117-122. doi: 10.1109/IICETA47481.2019.9012977.
  10. Saini N., Pandey N. and Singh A. P., (2016). A formal approach to security techniques in cognitive networks. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). Chennai, pp. 1-4. doi: 10.1109/ICCIC.2016.7919575.
APA
Doğan, H., & Bayrakdar, M. E. (2025). Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks. International Journal of Engineering Research and Development, 17(2), 465-471. https://doi.org/10.29137/ijerad.1484573
AMA
1.Doğan H, Bayrakdar ME. Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks. IJERAD. 2025;17(2):465-471. doi:10.29137/ijerad.1484573
Chicago
Doğan, Hüseyin, and Muhammed Enes Bayrakdar. 2025. “Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks”. International Journal of Engineering Research and Development 17 (2): 465-71. https://doi.org/10.29137/ijerad.1484573.
EndNote
Doğan H, Bayrakdar ME (July 1, 2025) Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks. International Journal of Engineering Research and Development 17 2 465–471.
IEEE
[1]H. Doğan and M. E. Bayrakdar, “Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks”, IJERAD, vol. 17, no. 2, pp. 465–471, July 2025, doi: 10.29137/ijerad.1484573.
ISNAD
Doğan, Hüseyin - Bayrakdar, Muhammed Enes. “Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks”. International Journal of Engineering Research and Development 17/2 (July 1, 2025): 465-471. https://doi.org/10.29137/ijerad.1484573.
JAMA
1.Doğan H, Bayrakdar ME. Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks. IJERAD. 2025;17:465–471.
MLA
Doğan, Hüseyin, and Muhammed Enes Bayrakdar. “Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks”. International Journal of Engineering Research and Development, vol. 17, no. 2, July 2025, pp. 465-71, doi:10.29137/ijerad.1484573.
Vancouver
1.Hüseyin Doğan, Muhammed Enes Bayrakdar. Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks. IJERAD. 2025 Jul. 1;17(2):465-71. doi:10.29137/ijerad.1484573