Research Article
BibTex RIS Cite

Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks

Year 2025, Volume: 17 Issue: 2, 465 - 471, 15.07.2025
https://doi.org/10.29137/ijerad.1484573

Abstract

Cognitive radio networks are an up-to-date technology that generally used for wireless communication. In cognitive radio networks, there are primary users and secondary users. Secondary users aim to opportunistically use the empty spectrum of licensed primary users. Thus, the spectrum is used efficiently. While the secondary user is using the primary user's empty spectrum, the primary user may need to use the spectrum. In this case, spectrum handoff is defined as the secondary user continues its communication by switching to a different spectrum. In this study, secure information transmission has been made in cognitive radio networks using the proactive spectrum handoff approach that is one of the spectrum handoff techniques. In the proactive spectrum handoff process, the frequency bands to be transferred are predetermined and unauthorized access to information is prevented.

References

  • Akram M. W., Salman M., Shah M. A. and Ahmed M. M., (2017). A review: Security challenges in cognitive radio networks. 23rd International Conference on Automation and Computing (ICAC). Huddersfield, pp. 1-6. doi: 10.23919/IConAC.2017.8082089.
  • Dey S., Saha M. I. (2023) A novel spectrum handoff switching decision scheme for improved performance of secondary users in cognitive radio network. Int J Commun Syst., 36(4),e5413. doi:10.1002/dac.5413
  • Hamood A. S. and Sadkhan S. B., (2017). Cognitive radio network security status and challenges. Annual Conference on New Trends in Information & Communications Technology Applications (NTICT). Baghdad, pp. 1-6. doi: 10.1109/NTICT.2017.7976105.
  • Kundu, A., Arif, W. (2024) Analysis of Bayesian game theoretic approach for the target channel selection of secondary user under heterogeneous cognitive radio network. Telecommun Syst. https://doi.org/10.1007/s11235-024-01118-5
  • Mishra N., Srivastava S. and Sharan S. N., (2019). Cognitive Radio Network Security Threats: A Review. 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT). Jaipur, India, pp. 333-338. doi:10.1109/ICCT46177.2019.8969053.
  • Pham-Thi-Dan N., Ho-Van K., Do-Dac T., Vo-Que S. and Pham-Ngoc S., (2019). Energy Harvesting Cooperative Cognitive Networks: Relay Selection for Information Security. International Symposium on Electrical and Electronics Engineering (ISEE). Ho Chi Minh, Vietnam, pp. 1-4. doi: 10.1109/ISEE2.2019.8921231.
  • Priyadarshi, R., Kumar, R.R. & Ying, Z. (2024) Techniques employed in distributed cognitive radio networks: a survey on routing intelligence. Multimed Tools Appl. https://doi.org/10.1007/s11042-024-19054-6
  • Raj S. and Sahu O. P., (2017). Security Threats and Challenges on Different Protocol Layers in Cognitive Radio Networks: An Overview. International Conference on Innovations in Control, Communication and Information Systems (ICICCI). Greater Noida, India, pp. 1-5. doi: 10.1109/ICICCIS.2017.8660761.
  • Sadkhan S. B. and Reda D. M., (2019). Security Issues of Cognitive Radio Network. 2nd International Conference on Engineering Technology and its Applications (IICETA). Al-Najef, Iraq, pp. 117-122. doi: 10.1109/IICETA47481.2019.9012977.
  • Saini N., Pandey N. and Singh A. P., (2016). A formal approach to security techniques in cognitive networks. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). Chennai, pp. 1-4. doi: 10.1109/ICCIC.2016.7919575.
  • Sharma G. and Sharma R., (2015). A review on recent advances in spectrum sensing, energy efficiency and security threats in cognitive radio network. International Conference on Microwave, Optical and Communication Engineering (ICMOCE). Bhubaneswar, pp. 114-117. doi: 10.1109/ICMOCE.2015.7489704.
  • Slimeni F., Scheers B. and Chtourou Z., (2015). Security threats in military cognitive radio networks. International Conference on Military Communications and Information Systems (ICMCIS). Cracow, pp. 1-10. doi: 10.1109/ICMCIS.2015.7158714.
  • Soliman J. N., Mageed T. A. and El-Hennawy H. M., (2017). Taxonomy of security attacks and threats in cognitive radio networks. Japan-Africa Conference on Electronics, Communications and Computers (JAC-ECC). Alexandria, pp. 127-131. doi: 10.1109/JEC-ECC.2017.8305794.
  • Trubin I. S., (2018). Security Threats in Mobile Cognitive Radio Networks. IEEE East-West Design & Test Symposium (EWDTS). Kazan, pp. 1-6. doi: 10.1109/EWDTS.2018.8524808.
  • Turkyilmaz Y., Senturk A., Bayrakdar M.E., (2023) Employing machine learning based malicious signal detection for cognitive radio networks. Concurrency Computat Pract Exper., 35(2):e7457. doi:10.1002/cpe.7457

Bilişsel Radyo Ağlarda Bilgi Güvenliği için Proaktif Spektrum El Değiştirme Yaklaşımı

Year 2025, Volume: 17 Issue: 2, 465 - 471, 15.07.2025
https://doi.org/10.29137/ijerad.1484573

Abstract

Bilişsel radyo ağlar, genel olarak kablosuz haberleşme için kullanılan güncel bir teknolojidir. Bilişsel radyo ağlarda, birincil kullanıcılar ve ikincil kullanıcılar bulunmaktadır. İkincil kullanıcılar, lisanlı olan birincil kullanıcıların boş olan spektrumlarını fırsatçı olarak kullanmayı hedeflemektedirler. Böylece, spektrum verimli bir şekilde kullanılmaktadır. İkincil kullanıcı birincil kullanıcının boş spektrumunu kullanmakta iken, birincil kullanıcının spektrumu kullanma ihtiyacı olabilmektedir. Bu durumda, ikincil kullanıcının farklı bir spektruma geçerek haberleşmesine devam etmesi spektrum el değiştirme olarak tanımlanmaktadır. Bu çalışmada, spektrum el değiştirme tekniklerinden proaktif spektrum el değiştirme yaklaşımı kullanılarak bilişsel radyo ağlarda güvenli bilgi iletimi yapılmıştır. Proaktif spektrum el değiştirme işleminde, geçiş yapılacak olan frekans bantları önceden belirlenerek tanımlandığı için bilginin izinsiz olarak erişimi engellenmiştir.

References

  • Akram M. W., Salman M., Shah M. A. and Ahmed M. M., (2017). A review: Security challenges in cognitive radio networks. 23rd International Conference on Automation and Computing (ICAC). Huddersfield, pp. 1-6. doi: 10.23919/IConAC.2017.8082089.
  • Dey S., Saha M. I. (2023) A novel spectrum handoff switching decision scheme for improved performance of secondary users in cognitive radio network. Int J Commun Syst., 36(4),e5413. doi:10.1002/dac.5413
  • Hamood A. S. and Sadkhan S. B., (2017). Cognitive radio network security status and challenges. Annual Conference on New Trends in Information & Communications Technology Applications (NTICT). Baghdad, pp. 1-6. doi: 10.1109/NTICT.2017.7976105.
  • Kundu, A., Arif, W. (2024) Analysis of Bayesian game theoretic approach for the target channel selection of secondary user under heterogeneous cognitive radio network. Telecommun Syst. https://doi.org/10.1007/s11235-024-01118-5
  • Mishra N., Srivastava S. and Sharan S. N., (2019). Cognitive Radio Network Security Threats: A Review. 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT). Jaipur, India, pp. 333-338. doi:10.1109/ICCT46177.2019.8969053.
  • Pham-Thi-Dan N., Ho-Van K., Do-Dac T., Vo-Que S. and Pham-Ngoc S., (2019). Energy Harvesting Cooperative Cognitive Networks: Relay Selection for Information Security. International Symposium on Electrical and Electronics Engineering (ISEE). Ho Chi Minh, Vietnam, pp. 1-4. doi: 10.1109/ISEE2.2019.8921231.
  • Priyadarshi, R., Kumar, R.R. & Ying, Z. (2024) Techniques employed in distributed cognitive radio networks: a survey on routing intelligence. Multimed Tools Appl. https://doi.org/10.1007/s11042-024-19054-6
  • Raj S. and Sahu O. P., (2017). Security Threats and Challenges on Different Protocol Layers in Cognitive Radio Networks: An Overview. International Conference on Innovations in Control, Communication and Information Systems (ICICCI). Greater Noida, India, pp. 1-5. doi: 10.1109/ICICCIS.2017.8660761.
  • Sadkhan S. B. and Reda D. M., (2019). Security Issues of Cognitive Radio Network. 2nd International Conference on Engineering Technology and its Applications (IICETA). Al-Najef, Iraq, pp. 117-122. doi: 10.1109/IICETA47481.2019.9012977.
  • Saini N., Pandey N. and Singh A. P., (2016). A formal approach to security techniques in cognitive networks. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). Chennai, pp. 1-4. doi: 10.1109/ICCIC.2016.7919575.
  • Sharma G. and Sharma R., (2015). A review on recent advances in spectrum sensing, energy efficiency and security threats in cognitive radio network. International Conference on Microwave, Optical and Communication Engineering (ICMOCE). Bhubaneswar, pp. 114-117. doi: 10.1109/ICMOCE.2015.7489704.
  • Slimeni F., Scheers B. and Chtourou Z., (2015). Security threats in military cognitive radio networks. International Conference on Military Communications and Information Systems (ICMCIS). Cracow, pp. 1-10. doi: 10.1109/ICMCIS.2015.7158714.
  • Soliman J. N., Mageed T. A. and El-Hennawy H. M., (2017). Taxonomy of security attacks and threats in cognitive radio networks. Japan-Africa Conference on Electronics, Communications and Computers (JAC-ECC). Alexandria, pp. 127-131. doi: 10.1109/JEC-ECC.2017.8305794.
  • Trubin I. S., (2018). Security Threats in Mobile Cognitive Radio Networks. IEEE East-West Design & Test Symposium (EWDTS). Kazan, pp. 1-6. doi: 10.1109/EWDTS.2018.8524808.
  • Turkyilmaz Y., Senturk A., Bayrakdar M.E., (2023) Employing machine learning based malicious signal detection for cognitive radio networks. Concurrency Computat Pract Exper., 35(2):e7457. doi:10.1002/cpe.7457
There are 15 citations in total.

Details

Primary Language English
Subjects Information Security Management
Journal Section Research Article
Authors

Hüseyin Doğan 0009-0006-0267-2857

Muhammed Enes Bayrakdar 0000-0001-9446-0988

Submission Date May 16, 2024
Acceptance Date May 21, 2025
Early Pub Date July 4, 2025
Publication Date July 15, 2025
Published in Issue Year 2025 Volume: 17 Issue: 2

Cite

APA Doğan, H., & Bayrakdar, M. E. (2025). Proactive Spectrum Handoff Approach for Information Security in Cognitive Radio Networks. International Journal of Engineering Research and Development, 17(2), 465-471. https://doi.org/10.29137/ijerad.1484573

Kırıkkale University, Faculty of Engineering and Natural Science, 71450 Yahşihan / Kırıkkale, Türkiye.

ijerad@kku.edu.tr