An Analytical Model for Dynamic Spectrum Sensing in Cognitive Radio Networks Using Blockchain Management †
Abstract
:1. Introduction
- Node: A node refers to a computational unit within the blockchain network with the capability to initiate, receive, or validate transactions [11]. It operates using software applications designed for specific business use cases. Typically, blockchains feature two types of nodes.
- Validator Nodes: These nodes possess enhanced capabilities, allowing them to initiate, receive, and validate transactions.
- Member Nodes: Member nodes, on the other hand, are limited to initiating and receiving transactions.
- Transaction: In the context of a blockchain, a transaction is a collection of various data items that convey information about the exchange of assets, services, entities, events, or anything of value.
- Block: A block is a data structure tasked with storing a collection of transactions. After undergoing successful verification, each block is distributed to all the nodes across the blockchain network.
- Block Number: This identifier uniquely identifies blocks within the chain of blocks.
- User Nodes: User nodes are primarily responsible for initiating transactions and do not engage in block verification.
2. Blockchain-Based CRN Security Technique
Algo Design Structure
3. Blockchain Technology Blockchain-Based Secure Spectrum
4. Result Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telemat. Inform. 2019, 36, 55–81. [Google Scholar] [CrossRef]
- Bayhan, S.; Zubow, A.; Gawlowicz, P.; Wolisz, A. Smart Contracts for Spectrum Sensing as a Service. IEEE Trans. Cogn. Commun. Netw. 2019, 5, 648–660. [Google Scholar] [CrossRef]
- Xiao, L.; Han, D.; Meng, X.; Liang, W.; Li, K.-C. A Secure Framework for Data Sharing in Private Blockchain-Based WBANs. IEEE Access 2020, 8, 153956–153968. [Google Scholar] [CrossRef]
- Chen, R.; Park, J.-M.; Reed, J.H. Defense against Primary User Emulation Attacks in Cognitive Radio Networks. IEEE J. Sel. Areas Commun. 2008, 26, 25–37. [Google Scholar] [CrossRef]
- Kumar, T.; Harjula, E.; Ejaz, M.; Manzoor, A.; Porambage, P.; Ahmad, I.; Liyanage, M.; Braeken, A.; Ylianttila, M. BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks. IEEE Access 2020, 8, 154166–154185. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. Blockchain for 5G and beyond networks: A state of the art survey. J. Netw. Comput. Appl. 2020, 166, 102693. [Google Scholar] [CrossRef]
- Taneja, S.; Marriwala, N. Block Chain Based Cognitive Wireless Networks: Challenges Applications. In Proceedings of the 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, India, 7–9 October 2021; pp. 811–816. [Google Scholar] [CrossRef]
- Pang, Y. A New Consensus Protocol for Blockchain Interoperability Architecture. IEEE Access 2020, 8, 153719–153730. [Google Scholar] [CrossRef]
- Choi, M.K.; Yeun, C.Y.; Seong, P.H. A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology. IEEE Access 2020, 8, 118732–118740. [Google Scholar] [CrossRef]
- Roy, C.; Misra, S.; Pal, S. Blockchain-Enabled Safety-as-a-Service for Industrial IoT Applications. IEEE Internet Things Mag. 2020, 3, 19–23. [Google Scholar] [CrossRef]
- Zhang, H.; Leng, S.; Wei, Y.; He, J. A Blockchain Enhanced Coexistence of Heterogeneous Networks on Unlicensed Spectrum. IEEE Trans. Veh. Technol. 2022, 71, 7613–7624. [Google Scholar] [CrossRef]
- Tariq, S.; Akhtar, N.; Afzal, H.; Khalid, S.; Mufti, M.R.; Hussain, S.; Habib, A.; Ahmad, G. A Novel Co-Training-Based Approach for the Classification of Mental Illnesses Using Social Media Posts. IEEE Access 2019, 7, 166165–166172. [Google Scholar] [CrossRef]
- Ni, W.; Zhang, Y.; Li, W. Optimal admission control for secondary users using blockchain technology in cognitive radio networks. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 1518–1526. [Google Scholar] [CrossRef]
- Pawar, A.; Jawale, M.; William, P.; Chhabra, G.; Rakshe, D.S.; Korde, S.K.; Marriwala, N. Implementation of blockchain technology using extended CNN for lung cancer prediction. Meas. Sensors 2022, 24, 100530. [Google Scholar] [CrossRef]
- Kalra, M.; Vohra, A.; Marriwala, N. Hybrid blockchain-based spectrum sharing algorithm for dynamic channel selection in cognitive radio. Meas. Sensors 2023, 25, 100648. [Google Scholar] [CrossRef]
- Cai, L.; Cao, K.; Wu, Y.; Zhou, Y. Spectrum Sensing Based on Spectrogram-Aware CNN for Cognitive Radio Network. IEEE Wirel. Commun. Lett. 2022, 11, 2135–2139. [Google Scholar] [CrossRef]
- Khan, A.U.; Abbas, G.; Abbas, Z.H.; Khan, W.U. On Reliable Key Performance Indicators in Cognitive Radio Networks. IEEE Netw. Lett. 2021, 4, 11–15. [Google Scholar] [CrossRef]
- Papadopoulos, A.; Chatzidiamantis, N.D.; Georgiadis, L. Network Coding Techniques for Primary-Secondary User Cooperation in Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 2020, 19, 4195–4208. [Google Scholar] [CrossRef]
- Sharifi, A.A. Attack-Aware Defense Strategy: A Robust Cooperative Spectrum Sensing in Cognitive Radio Sensor Networks. Iran. J. Sci. Technol. Trans. Electr. Eng. 2018, 43, 133–140. [Google Scholar] [CrossRef]
- Ding, G.; Jiao, Y.; Wang, J.; Zou, Y.; Wu, Q.; Yao, Y.-D.; Hanzo, L. Spectrum Inference in Cognitive Radio Networks: Algorithms and Applications. IEEE Commun. Surv. Tutorials 2017, 20, 150–182. [Google Scholar] [CrossRef]
- Jararweh, Y.; Salameh, H.A.B.; Alturani, A.; Tawalbeh, L.; Song, H. Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks. Telecommun. Syst. 2017, 67, 217–229. [Google Scholar] [CrossRef]
Aspect | Blockchain | Databases |
---|---|---|
Record immutability | Records are immutable once added to the chain, making them highly resistant to tampering or alteration. | Records can be modified or deleted by authorized users, compromising data integrity. |
Decentralization | Operates in a decentralized manner, distributing control and data across a network of nodes. | Typically, databases are centralized, with a single authority or server managing data access and control. |
Trust and transparency | Offers transparency, as all participants can view the entire transaction history, enhancing trust. | Access permissions in databases can limit visibility, potentially raising trust issues. |
Security | Employs cryptographic techniques to ensure data security, making it robust against cyber threats. | Security measures in databases may vary, and vulnerabilities can be exploited by skilled attackers. |
Consensus mechanism [11] | Achieves consensus through complex algorithms and validation by network participants. | Relies on a central authority or predetermined rules to maintain data consistency. |
Transaction speed | Transaction processing speed can vary depending on the blockchain’s design and network size. | Traditional databases often offer faster transaction processing. |
Data recovery | Recovery options may be limited, as immutability may hinder data modification in the case of errors. | Data recovery and modification are more flexible in databases. |
Cost efficiency | May involve transaction fees, especially in public blockchains, impacting cost-effectiveness. | Databases may have lower operational costs but can entail licensing fees. |
Use cases | Ideal for scenarios requiring trust, transparency, and security, such as financial transactions and supply chain tracking. | Well suited for applications where data modification and retrieval are frequent, like content management systems. |
(A) | |||||
Block | # 1 | ||||
Nonce | 36,584 | ||||
Transaction | Rs 65 | from | Ravi | to | Mohit |
Rs 30 | from | Pankaj | to | Vishal | |
Rs 45 | from | Ravi | to | Mohit | |
Rs 50 | from | Rohit | to | Sonu | |
Rs 30 | from | Mohit | to | Kunal | |
Previous | 00000000000000000000000 | ||||
Hash | 0000ab2des234f453f4r5tfe34 | ||||
(B) | |||||
Block | # 2 | ||||
Nonce | 82,549 | ||||
Transaction | Rs 25 | from | Mohit | to | Priya |
Rs 30 | from | Sonu | to | Reena | |
Rs 15 | from | Kunal | to | Ravi | |
Rs 25 | from | Ravi | to | Sonu | |
Rs 30 | from | Pankaj | to | Kunal | |
Previous | 0000ab2des234f453f4r5tfe34 | ||||
Hash | 0000rgtf3r4r45t6y6hfrett56y5 |
Sr. No. | Parameter | Value |
---|---|---|
1 | Configuration of the simulation area | A circular area with a radius of m |
2 | Primary user | Positioning a primary user at any location along the perimeter of the circular area |
3 | Operational parameters of a primary user | Utilizing a BPSK signal with a power level of 100 MW and a bandwidth of 100 kHz. |
4 | Number of nodes | Randomly distributing 15 nodes, with five nodes having SNR of −18 dB and the remaining nodes with SNR of −14 dB. |
5 | Configuration of noise | AWGN |
6 | Average detection time | 10,000 |
7 | Auxiliary node | 3 |
8 | Spectrum detection method of the node front end | Energy detection |
QPS | Direct Interactive Traffic (MB/S) | Encrypted Authentication Traffic (MB/S) | Traffic Utilization (%) |
---|---|---|---|
1 | 1 | 1 | 100 |
2 | 2 | 2.001 | 99.95 |
5 | 5 | 5.002 | 99.96 |
10 | 10.001 | 10.005 | 99.96 |
20 | 20.002 | 20.011 | 99.955 |
40 | 20.004 | 20.02 | 99.95 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Marriwala, N.K.; Panda, S.; Kamalanathan, C.; Sadhasivam, N.; Ramaiah, V.S. An Analytical Model for Dynamic Spectrum Sensing in Cognitive Radio Networks Using Blockchain Management. Eng. Proc. 2023, 59, 163. https://doi.org/10.3390/engproc2023059163
Marriwala NK, Panda S, Kamalanathan C, Sadhasivam N, Ramaiah VS. An Analytical Model for Dynamic Spectrum Sensing in Cognitive Radio Networks Using Blockchain Management. Engineering Proceedings. 2023; 59(1):163. https://doi.org/10.3390/engproc2023059163
Chicago/Turabian StyleMarriwala, Nikhil Kumar, Sunita Panda, Chandran Kamalanathan, Narayanan Sadhasivam, and Vootla Subba Ramaiah. 2023. "An Analytical Model for Dynamic Spectrum Sensing in Cognitive Radio Networks Using Blockchain Management" Engineering Proceedings 59, no. 1: 163. https://doi.org/10.3390/engproc2023059163
APA StyleMarriwala, N. K., Panda, S., Kamalanathan, C., Sadhasivam, N., & Ramaiah, V. S. (2023). An Analytical Model for Dynamic Spectrum Sensing in Cognitive Radio Networks Using Blockchain Management. Engineering Proceedings, 59(1), 163. https://doi.org/10.3390/engproc2023059163