Visible to the public Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications

TitleSecurity-aware channel assignment in IoT-based cognitive radio networks for time-critical applications
Publication TypeConference Paper
Year of Publication2017
AuthorsSalameh, H. B., Almajali, S., Ayyash, M., Elgala, H.
Conference Name2017 Fourth International Conference on Software Defined Systems (SDS)
ISBN Number978-1-5386-2855-3
KeywordsChannel allocation, channel assignment problem, Cognitive radio, Cognitive Radio Security, cognitive radio transmission, delays, fading conditions, Internet of Things, IoT-based cognitive radio networks, IoT-based CRN, jamming, jamming attacks, proactive jamming attacks, probabilistic spectrum assignment algorithm, pubcrawl, Resiliency, security, security-aware channel assignment, Sensors, telecommunication channels, telecommunication security, Time factors, time-critical applications, time-critical data delivery, Wireless communication
Abstract

Cognitive radio networks (CRNs) have a great potential in supporting time-critical data delivery among the Internet of Things (IoT) devices and for emerging applications such as smart cities. However, the unique characteristics of different technologies and shared radio operating environment can significantly impact network availability. Hence, in this paper, we study the channel assignment problem in time-critical IoT-based CRNs under proactive jamming attacks. Specifically, we propose a probabilistic spectrum assignment algorithm that aims at minimizing the packet invalidity ratio of each cognitive radio (CR) transmission subject to delay constrains. We exploit the statistical information of licensed users' activities, fading conditions, and jamming attacks over idle channels. Simulation results indicate that network performance can be significantly improved by using a security- availability- and quality-aware channel assignment that provides communicating CR pair with the most secured channel of the lowest invalidity ratio.

URLhttps://ieeexplore.ieee.org/document/7939139
DOI10.1109/SDS.2017.7939139
Citation Keysalameh_security-aware_2017