Double Auction Framework to Manage the Secondary Users in Cognitive Radio Networks (Crns)
Keywords:Cognitive Radio Network, Dynamic Spectrum Leasing (DSL), Spectrum Sensing Data Falsification (SSDF) attack, Double Auction Framework (DAF).
Cognitive Radio Networks (CRNs) is an emerging concept in wireless access between the users. The CRNs intend towards effective utilization of frequency spectrum when the licensed user is not utilizing the spectrum. The CRNs are vulnerable to security issues like general networks. Security provisioning plays a vital role in CRNs for authorizing the information being shared among the legitimate Primary Users (PUs) and the opportunistic Secondary Users (SUs). This work mainly focuses on the mitigation of selfishness among the unlicensed users during the presence of multiple malicious users. In this work, we consider a beam-forming based Dynamic Spectrum Leasing (DSL)  concept to enhance the spectrum utilization for the communication between the primary and secondary users. We propose a Double Auction Framework (DAF) for improving the Selfish SU detection rate during the presence of malicious users to improve the number of opportunistic Users without creating hindrance to the legitimate User. The Simulation results reveal that the DAF-DSL based scheme provides effective spectral gains comparing with the baseline scheme for the secondary users spectrum utilization.
 I.Stanojev, O. Simeone, S. Savazzi, Y. Bar-Ness, U. Spagnolini, and R. Pickholtz, â€œSpectrum leasing to cooperating secondary ad hoc networks,â€ IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 203â€“213, Jan. 2008
 Suchismita Bhattacharjee, Roshni Rajkumari, Ningrinla Marchang,â€ Cognitive Radio Networks Security Threats and Attacks: A Reviewâ€. International Conference on Information and Communication Technologies (ICICT- 2014)
 Shakeel PM, Baskar S, Dhulipala VS, Mishra S, Jaber MM., â€œMaintaining security and privacy in health care system using learning based Deep-Q-Networksâ€, Journal of medical systems, 2018 Oct 1;42(10):186.https://doi.org/10.1007/s10916-018-1045-z
 Hano Wang, Jemin Lee, Sungtae Kim, Student Member, IEEE, and Daesik Hong, Senior Member, IEEE, â€œCapacity of Secondary Users Exploiting Multi-spectrum and Multiuser Diversity in Spectrum-Sharing Environmentsâ€ IEEE transactions on vehicular technology, vol. 59, no. 2, february 2010.
 Ying-Chang Liang, Fellow, IEEE, Kwang-Cheng Chen, Fellow, IEEE, Geoffrey Ye Li, Fellow, IEEE, and Petri MÃ¤hÃ¶nen, Senior Member, IEEE â€œCognitive Radio Networking and Communications: An Overviewâ€. IEEE transactions on vehicular technology, vol. 60, no. 7, september 2011.
 Hong Wen, Shaoqian Li, Xiping Zhu, and Liang Zhou, â€œA Framework of the PHY-layer Approach to Defence Against Security Threats in Cognitive Radio Networksâ€ (UESTC) IEEE Network May/2013
 Ehsan Nekouei, Student Member, IEEE, Hazer Inaltekin, Member, IEEE, and Ubhrakanti Dey, Senior Member, IEEE â€œPower Control and Asymptotic Throughput Analysis for the Distributed Cognitive Uplinkâ€. IEEE transactions on communications, vol. 62, no. 1, January 2014
 Enrique Hern_andez-Orallo, Member, IEEE, Manuel David Serrat Olmos, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni, Member, IEEE , â€œCoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodesâ€. IEEE Transactions on Mobile Computing1536-1233 (c) 2013
 Xiaoyan Wang, Member, IEEE, Yusheng Ji, Member, IEEE, Hao Zhou, Member, IEEE, and Jie Li, Senior Member, IEEE â€œAuction Based Frameworks for Secure Communications in Static and Dynamic Cognitive Radio Networksâ€ IEEE Transactions on Vehicular Technology 2016.
 â€œThroughput Scaling in Cognitive Multiple Access With Average Power and Interference Constraints â€œ.Ehsan Nekouei, Student Member, IEEE, Hazer Inaltekin, Member, IEEE, and Subhrakanti Dey, Senior Member, IEEE Volume IEEE Transactions On Signal Processing, Vol. 60, No. 2, February 2012
 â€œMulti-Phase Smart Relaying and Cooperative Jamming in Secure Cognitive Radio Networksâ€. Pin-Hsun Lin, Member, IEEE, FrÃ©dÃ©ric Gabry, Member, IEEE, Ragnar Thobaben, Member, IEEE, Eduard A. Jorswieck, Senior Member, IEEE, and Mikael Skoglund, Senior Member IEEE, IEEE Transactions On Cognitive Communications And Networking, Vol. 2, No. 1, March 2016
 J. Khun-Jush, P. Bender, B. Deschamps, and M. Gundlach, â€œLicensed shared access as complementary approach to meet spectrum demands: Benefits for next generation cellular systems,â€ in Proc. ETSI Workshop Reconfigurable Radio Syst., 2012, pp. 1â€“7.
 R. Etkin, A. Parekh, and D. Tse, â€œSpectrum sharing for unlicensed bands,â€ IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 517â€“528, Apr. 2007.
 J. M. Peha, â€œApproaches to spectrum sharing,â€ IEEE Commun. Mag., vol. 43, no. 2, Feb. 2005.
 Suchita S. Potdar1, Dr. Mallikarjun, â€œSelfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theoryâ€. 3 Issue 8, August 2014.
 Y. Yi, J. Zhang, Q. Zhang, T. Jiang, and J. Zhang, â€œCooperative communication-aware spectrum leasing in cognitive radio networksâ€, in Proc. IEEE Symp. New Frontiers Dynamic Spectrum, Apr. 2010, pp. 1â€“11.
 S. K. Jayaweera, M. Bkassiny, and K. A. Avery, â€œAsymmetric cooperative communications based spectrum leasing via auctions in cognitive radio networks,â€ IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2716â€“2724, Aug. 2011.
  M. Hafeez and J. M. H. Elmirghani, â€œDynamic spectrum leasing for beam-forming cognitive radio networks using network coding,â€ in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2013, pp. 2840â€“2845.
 Ju Ren, Student Member, IEEE, Yaoxue Zhang, Qiang Ye, Kan Yang, Kuan Zhang, and Xuemin (Sherman) Shen, Fellow, IEEE "Exploiting Secure and Energy Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks" JUNE, 2016
 H. Hakim, W. Ajib, and H. Boujemaa, â€œSpectrum sharing for bidirectional communication in cognitive radio networks,â€ in IEEE 9th Int. Conf. Wireless Mobile Comput., Netw. Commun. (WiMob), Oct. 2013, pp. 763â€“768.
 P. Mohamed Shakeel; Tarek E. El. Tobely; Haytham Al-Feel; Gunasekaran Manogaran; S. Baskar., â€œNeural Network Based Brain Tumor Detection Using Wireless Infrared Imaging Sensorâ€, IEEE Access, 2019, Page(s): 1
 Ping Xie, Moli Zhang, Gaoyuan Zhang, Ruijuan Zheng, Ling Xing; Qingtao Wu, "On Physical-layer security for primary system in underlay cognitive radio networksâ€, IET Networks, Year: 2018, Volume: 7, Issue: 2, Pages: 68 - 73.
 Lei Xu, Arumugam Nallanathan, Xiaofei Pan, Jian Yang, Wenhe Liao, â€œSecurity-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Networkâ€, IEEE Transactions on Information Forensics and Security, Page(s): 366 â€“ 376, 2017.
 Li-Chun Wang ; Chung-Wei Wang, â€œA cross-layer design of clustering architecture for wireless sensor networksâ€, IEEE International Conference on Networking, Sensing and Control, 2004.