Performance Evaluation of Cognitive Internet on Things Under Routing Attacks

Author(s): Ruchi Makani*, Busi V. Ramana Reddy

Journal Name: International Journal of Sensors, Wireless Communications and Control

Volume 10 , Issue 1 , 2020

Become EABM
Become Reviewer

Graphical Abstract:


Abstract:

Background & Objective: In past few years, Cognitive Radio (CR) paradigm has emerged as a promising and revolutionary solution to avoid problems of spectrum paucity and inefficiency in spectrum usage. Efficiently utilization of the spectrum offers high network performance. CRs are proficient to identify and adopt the unused spectrum in order to allow secondary users to occupy it without interfering the primary user’s activity. Cognitive Internet on Things (CIoT) is an integration of several technologies and communication solutions which can be effectively realized as Cognitive Radio Adhoc Networks (CRAHN). In CRANH, on-demand routing protocols are the best suitable protocols due to their dynamic feature of available un-utilized channel/spectrum selection.

Methods: Here, firstly, Ad-Hoc On-Demand Distance Vector (AODV) routing protocol has been modified and further evaluated to address route selection challenges in CIoT framework. Secondly, the effects on network performance under network layer routing attacks (i.e. blackhole attack, byzantine attack and flooding attacks) are evaluated.

Conclusion: The simulations results demonstrate network performance increase with more channels and degrade differently under attacks.

Keywords: AODV, black hole attack, byzantine attack, cognitive internet on things, cognitive radio adhoc networks, flooding attack, network layer routing attacks, spectrum management framework.

[1]
Reina DG, Toral SL, Barrero F, Bessis N, Asimakopoulou E. The role of Ad hoc networks in the internet of things: a case scenario for smart environments. Internet Things Inter-Cooperat Computat Tech Collective Intellig Series Studies Computat Intellig 2013; 460: 89-113.
[2]
Akyildiz IF, Lee WY, Vuran MC, Mohanty S. A survey on spectrum management in cognitive radio networks. Cognitive Radio Commun Netw IEEE Commun Magaz 2008; 46(4): 40-8.
[3]
Talebi SP. Primary service outage and secondary service performance in cognitive radio networks. Wiley Online Library. Wirel Commun Mob Comput 2015; 15: 1982-90.
[4]
Cesana M, Cuomo F, Ekici E. Routing in cognitive radio networks: challenges and solutions. Ad Hoc Netw 2011; 9: 228-48.
[5]
Yucek T, Arslan H. A survey of spectrum sensing algorithms for cognitive radio applications. IEEE Comm Surv Tutor 2009; 11(1): 116-30.
[6]
Preet A, Kaur A. Review paper on cognitive radio networking and communications. Int J Comp Sci Info Tech 2014; 5(4): 5508-11.
[7]
Nguyen-Thanh N, Nonmember N, Anh TPHAM, Van-Tam N. Medium access control design for cognitive radio networks: a survey. IEICE Transact Commun 2014. 97-B(2).
[8]
Cheng G, Liu W, Li Y, Cheng W. Spectrum aware on-demand routing in cognitive radio networks. Proc 2nd IEEE Int Symp New Frontiers Dynamic Spectrum Access Netw 2007; 571-4.
[9]
Cheng G, Liu W, Li Y, Cheng W. Joint on-demand routing and spectrum assignment in cognitive radio networks. Proc IEEE Int Conf Commun 2007; 6499-503.
[10]
Chen J, Li H, Wu J. WHAT: a novel routing metric for multi-hop cognitive wireless networks. Proc 19th Annual Wireless Optical Commun Conf Shanghai 2010, May 14-15;
[11]
Sampath A, Yang L, Cao L, Zheng H, Zhao BY. High throughput spectrum-aware routing for cognitive radio based ad-hoc networks. Proc 3rd Int Conf Cognitive Radio Oriented Wireless Netw Commun 2008.
[12]
Pefkianakis I, Wong SHY, Lu S. SAMER: spectrum aware mesh routing in cognitive radio networks. 3rd IEEE Symp New Frontiers Dynamic Spectrum Access Netw DySPAN 2008.
[13]
Ma H, Zheng L, Ma X, Luo Y. Spectrum aware routing for multi-hop cognitive radio networks with a single transceiver. Proc 3rd Int Conf Cognitive Radio Oriented Wireless Netw Commun 2008; 1-6.
[14]
Wang X, Kwon TT. Choi. A Multipath Routing And Spectrum Access (MRSA) framework for cognitive radio systems in multi-radio mesh networks. Proc ACM Workshop Cognitive Radio Netw 2009.
[15]
Zhang B, Takizawa Y, Hasagawa A, Yamauchi A, Obana S. Tree-based routing protocol for cognitive wireless access networks. Proc IEEE Wireless Commun Netw Conf 2007.
[16]
Salim S, Moh S. On-demand routing protocols for cognitive radio ad hoc networks. Springer. EURASIP J Wirel Commun Netw 2013; 102.
[17]
Perkins CE, Royer EM. Ad hoc on-demand distance vector (AODV) routing. Internet Engr Task Force (IETF), Request for Comments 3561,July 2003.
[18]
Chen R, Park J, Reed J. Defense against primary user emulation attacks in cognitive radio networks. IEEE J Sel Areas Comm 2008; 22(1): 25-37.
[19]
Clancy TC, Goergen N. Security in cognitive radio networks: threats and mitigation Int Conf Cognitive Radio Oriented Wireless Netw Commun. (CrownCom) Singapore,. 2008; pp. 1-8.
[20]
El-Hajj W, Safa H, Guizani M. Survey of security issues in cognitive radio network. J Internet Tech 2011; 12(2): 1-18.


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 10
ISSUE: 1
Year: 2020
Page: [15 - 24]
Pages: 10
DOI: 10.2174/2210327909666181217122655
Price: $25

Article Metrics

PDF: 10
HTML: 3
PRC: 1