You are on page 1of 6

A Framework for Secure Cooperative Spectrum

ϮϬϮϯ/ŶƚĞƌŶĂƚŝŽŶĂůŽŶĨĞƌĞŶĐĞŽŶƌƚŝĨŝĐŝĂů/ŶƚĞůůŝŐĞŶĐĞĂŶĚ<ŶŽǁůĞĚŐĞŝƐĐŽǀĞƌLJŝŶŽŶĐƵƌƌĞŶƚŶŐŝŶĞĞƌŝŶŐ;/KE&ͿͮϵϳϵͲϴͲϯϱϬϯͲϯϰϯϲͲϰͬϮϯͬΨϯϭ͘ϬϬΞϮϬϮϯ/ͮK/͗ϭϬ͘ϭϭϬϵͬ/KE&ϱϳϭϮϵ͘ϮϬϮϯ͘ϭϬϬϴϯϴϴϳ

Sensing based with Blockchain and Deep


Learning model in Cognitive Radio
Neelam Dewangan1, Arun Kumar2, R.N. Patel3
1
Chhattisgarh Swami Vivekananda Technical University, Bhilai
2
Bhilai Institute of Technology, Durg
3
National Institute of Technology, Raipur

E-mail : neelam.dewangan28@gmail.com, arun.kumar@gmail.com, rnpatel@gmail.com

Abstract-Today we live in era where not only humans cognitive radios (PUs). Such access to spectrum can
interact but machines interact too. Internet of Things be provided only when the active SU in the
has disrupted the communication with an enormous cooperative network does not interfere with the
growth in number of connected devices worldwide. transmissions of PU. One of the numerous roles of
This resulted in big challenges to meet the spectrum
CR is spectrum sensing. Other functions include
requirement of these devices such as seamless
connectivity, scalability and accessibility. Cognitive
spectrum sharing, spectrum access, and mobility and
Radio (CR) is designed to meet the requirement since control of the spectrum [1]. There are huge
it uses spectrum holes in the licensed bands. Security challenges in the implementation of CRN as it has to
issues put at risk spectrum sensing, a crucial part of deal with ever changing radioenvironment, the MAC
the Cognitive Radio Network (CRN).A malicious user layer of these users has to handle these tasks
(MU) reduces the accuracy of spectrum sensing, properly. These limits, in contrast to the current
particularly in the situation of cooperative spectrum static spectrum laws, make the implementation of
sensing where MU transmits fabricated data to the CRN highly complex. Opportunistic spectrum
fusion centre.The performance of cognitive radios may access (OSA) is a concept that has gained popularity
suffer from the presence of such MU in the system that
recently in an effort to drastically increase spectrum
create erroneous sensing data. As a result, this paper
proposes a Blockchain-based method for MU detection
utilisation [2,7]. The SUs must be able to
in networks.This strategy makes it simple to dynamically seek out and seize chances within the
distinguish between a trustworthy user and a MU permissible spectrum in a multitude of dimensions,
using cryptographic keys. The effectiveness of the including time, frequency, code, and others, in order
suggested technique is examined using python tool. to accomplish this. The OSA protocol must therefore
The proposed method detects Malicious user with 100 include capabilities for spectrum access and sensing.
% efficiency in very less sensing time of 0.6ms. The The primary components of a low-cost OSA
results were also compared with adaptive threshold, protocol style are spectrum sensing, allocation,
FOF and TTA algorithms. access, sharing, and quality. Spectrum scarcity has
been alleviated through cognitive radio [3]. SU can
Keywords—cognitive radio, blockchain, spectrum
sensing, malicious user
use cognitive radio to send data in unlicensed
frequency without obstructing the use of the
I.INTRODUCTION operational licenced spectrum. Prior to this,
spectrum was fixedly assigned, preventing fixed
Making appropriate use of the spectrum as the users from utilising anything other than licenced
number of communication devices increases, is frequency. Smart spectrum sensing enables this type
today’s fuelled issue. Cognitive Radios (CR) are of safe network sensing. By moving on to higher
composed of inventive systems that can effectively quality channels before potential malicious user
sense its environment to locate free bands of (MU) jamming efforts, it may successfully avoid
licenced user or primary users (PU). Secondary them. When less bandwidth is needed, it uses a
Users (SUs) can more easily access the spectrum power-saving strategy by speaking at a low volume.
that Primary Users (PUs) aren't using thanks to This smart radio improves Quality of Service (QoS)
by selecting frequency channels with an acceptable

1
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:06:21 UTC from IEEE Xplore. Restrictions apply.
Signal to Noise Ratio (SNR).[6]. malicious users are found and eliminated through
cooperative sensing. In a cognitive radio system, a
Cognitive radio has assisted in addressing the method for the simultaneous detection and
spectrum shortage, however there are still issues suppression of risky users is provided [11]. The
with its practical use. When CRN is implemented, spatial correlation of Received Signal Strength
the first decision to be made is whether to use a (RSS) close to the SU and outlier detection are used
distributed or centralised architecture. The complex in a decentralised system in [13] to identify the
process of learning, which entails keeping track of malicious user. It is advised to employ a voting
previous actions and using that knowledge to modify method to assess whether dangerous users are
future behaviour, is another problem. CRN's security present close to SUs. In [14], another method for
issue has received the most attention [4]. This is identifying dishonest and malicious users is
because many wireless devices have access to the proposed. It makes use of two Hidden Markov
licenced spectrum that PU uses, which makes them Models (HMM). The discrepancy between the
vulnerable to MU attacks. CRN faces novel security corresponding HMM parameters allow for this
issues that are directly tied to cognitive radio detection. In a different study [12], a proposed
capabilities, in addition to security-related issues method is employed to accurately identify intelligent
including data forgery, emulation, Journal Pre-proof MUs and SUs.It is based on the concept of friend
Journal Pre-proof assault on PU, eavesdropping, and foe detection approach. Some suggested defence
manipulation, and non-cooperation. h cognitive tactics against Primary User Emulation (PUE)
radio.The Blockchain concept is used in this paper to assaults are available. A cooperative system that
suggest a method for enhancing the security of CR may launch assaults while being aware of PUE
networks during spectrum sensing.As a result, damaging attacks is proposed. The likelihood of a
security challenges wits have become the most false signal from a PUE attack is assessed in both
popular research topic [5]. Following are the main the absence and presence of PUE assaults. In order
contributions of the proposed work: to lower the overall error probability, threshold is
x Blocks of PU and SU’s are created and the computed. [14]
malicious user is detected on the basis of
digital signatures. III.PROPOSED METHODOLOGY
x We have employed deep learning model for
spectrum sensing and the efficiency of the This section will talk about a Blockchain-based
algorithm is validated through results. framework for secure spectrum sensing. To begin
with the model first each and every user i.e., Primary
II.RELATED WORK as well as Secondary users will create blocks to enter
in blockchain system. Structure of the blocks are
Numerous articles that study this topic have been described in detail in the previous section. Now, the
published because it is a typical problem to find spectrum sensing will be done by the deep learning
rogue users. In [10], a brand-new technique for model which is based on LSTM integrated AlexNet
identifying malicious users is described. It utilises described in [3,4]. Figure 1 shows schematic of
the cooperative spectrum sensing outlier detection LSTM integrated AlexNet model for spectrum
feature of cognitive radios. The method suggested in sensing. After spectrum sensing malicious nodes
the article [9] runs independently of any harmful will be detected with the help of Blockchain
users that may be present on the network, and technology [5]

2
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:06:21 UTC from IEEE Xplore. Restrictions apply.
Figure 1. Spectrum sensing with LSTM integrated AlexNet [4]

3.1 System Design of Cognitive based blockchain by consensus whether the user is genuine or
The schematic for a blockchain-based cognitive malicious. Blockchain have been implemented on
radio network is shown in Figure 1. Here, we are CRN, connecting PUs and SUs in a peer-to-peer
assuming a distributed scenario in which all SUs topology, making our network completely
submit their detection to the fusion centre, which decentralised. We only employ one PU and N SUs
then determines whether the PU is active or not for convenience. The Blockchain implementation for
according on some rules. Consider a network of CRNs' spectrum sensing is clearly seen in Figure 6.
cognitive radios with a sizable PU and SU The words "PUs" and "SUs" are frequently used to
population. Figure 2 shows that PUs is still within refer to CR users.Every CR user is connected to
their useful transmission range even when they are every other user decentralised. They are now hash-
dispersed from SUs. In this approach of cooperative to-hash related to one another. Below is a
sensing, all nodes work together to get the intended description of the four different sorts of information
outcome. The sensing phase starts when the that each block of CR users contains.
spectrum sensing starts and lasts until it is decided

Figure 2 . Schematic of BlockChain based Cognitive radio Network

a) A hash is a unique key created by the SHA256 b) Sense Outcome: This part of the block contains
algorithm. A special key is given to each user; the information. It provides information on the
this key serves as their public key. The users in results of sensing using the energy detection
the block after them are aware of this key. It is, method.
to put it simply, a network shared key. c) Private Key: Only the CR user has access to the

3
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:06:21 UTC from IEEE Xplore. Restrictions apply.
specific identification key for each block. The Algorithm 2: LSTM integrated AlexNet
method we offer generates a 16-bit key that Sl. No. LSTM integrated AlexNet
serves as a private key. 1 Initialize ߠ with random weights
d) Previous Hash: It contains the hash value from 2 Set iteration to 1
the previous node. The nodes are connected and 3 Collect the samples (K,L) according to
sense cooperatively. eqn (2), (3)
4 Whileiter൑ maxiteration do
Steps for proposed methodology has been explained 5 Update ߠ with SGD
below: 6 ݅െ݅൅ͳ
3.2 Blockchain creation 7 End while
First and foremost step is to create blocks for all the 8 Return decision
nodes present in the Cognitive Radio Network
(CRN). The licensed nodes are referred to as
primary user (PU) nodes whereas the opportunistic
ones are called as secondary user (SU) node or
cognitive radio (CR) node.Algorithm 1describes
pseudo code for blocks creations both for PU and
SU. The blocks will contain private key with
information about authentication codes whereas
public key will contain information such as status of
the node, general information etc.

Algorithm 1: Blocks Creation


Algorithm 1: Conversion into blocks
S.No. Input: Nodes in CRN Network, 1
primary node and remaining‫ ܯ‬െ ͳ
secondary nodes
1 Output:Node blocks for each primary
node and secondary node
2 For݅ ൌ ͳ‫ܯ݋ݐ‬
3 IF licenced user
4 Create Primary Node
5 ELSE
Figure3. Flow Chart of BlockChain and Deep
6 Create Secondary Node
Learning model based Cognitive radio Network
7 ELSEIF
3.4Malicious user detection
3.3 LSTM integrated AlexNet Deep Learning model After the creation of blocks and local spectrum
for spectrum sensing
sensing based on CNN, the next step becomes
The Energy and Eigen statistics of the primary Malicious User (MU) detection. They are detected
blocks are extracted through the convolution layers on the basis of digital signatures. The nodes whether
of the AlexNet architecture of Convolutional Neural
it is PU or SU are verified on the basis of private key
Network (CNN) model and then the spectrum and public key associated with each node. It is to be
sensing is done locally at every SU node. Figure 3
noted that whenever the digital signature is verified
shows complete flowchart of secure spectrum then the user will be authenticated and referred to as
sensing based on block chain and LSTM integrated Trusted User (TU) and if the signature is not verified
AlexNet. Here, after the local spectrum sensing
then then the authentication is failed and such
performed at each SU node, the user is validated malevolent node or user is referred to as MU.
with blockchain technology, thereafter the results are
Whenever nodes are identified as MU, the model is
sent to the fusion centre which then applies K-out- evaluated on following parameters [5]:
of-N Rule to decide whether the spectrum is present
or not.Algorithm 2gives the pseudo code of the 1. Probability of False Alarm:It is the ratio of
LSTM integrated ALexNet. number of times the model fails to recognize MU

4
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:06:21 UTC from IEEE Xplore. Restrictions apply.
and TU with the total number of iterations or it may (TTA)[9] is 0.75 and 0.3 respectively. It is worth to
be also called as missed number of detections of TU be noted that in sensing time 0.9ms the values of the
and MU. Mathematically, proposed method approaches to one whereas for
࡮ ‫׎‬′ࡹࢁ FOF it is 0.5, for TTA is 0.6 (approx), adaptive
च࡮
ሺࡲ࡭ሻ ൌ ૚ െ चሺࡹࢁሻ ൌ (1)
ल threshold also performs better that FOF and TTA
Where, च࡮
ሺࡲ࡭ሻ is the probability of blockchain based and it approches to 0.96.
false alarm, च࡮ ሺࡹࢁሻ is the probability of blockchain
based malicious user detection, ‫׎‬′ࡹࢁ is described as
the number of times malicious user was failed to be
detected and लcan be called as number of iterations.
2. Probability of missed detection:It is the
number of times Trusted user is failed to
authenticate. It is given by,
‫׎‬Ԣ
च࡮ ࢓࢏࢙࢙ࢋࢊሺࡹࢁሻൌ ल
ࢀࢁ
(2)
Ԣ
Where, ‫ ࢁࢀ׎‬is the number of times trusted user is
not predicted.
3. Probability of MU detection : It is the
number of times MU is identified in effective
iterations divided by the total number of iterations.
i.e. Figure 4. Probability of detection vs sensing time for
‫ࢁࡹ׎‬
च࡮ ሺࡹࢁሻൌ ल (3) adaptive threshold, FOF, TTA and proposed method
where, ‫ ࢁࡹ׎‬is count of times when MU is predicted.
4. Probability of TU detection:It is the ratio of
the number of times TU is accurately predicted to
the total number of effective iterations conducted i.e.
‫ࢁࢀ׎‬
च࡮ ሺࢀࢁሻൌ ल (4)
where, ‫ ࢁࢀ׎‬is count of times when TU is predicted.

IV. RESULTS AND DISCUSSION

The effectiveness of the suggested strategy was


assessed by extensive simulations.All the
simulations were carried out with python 3.11.0 tool
and implemented in Intel Core i3-2450 M CPU 2.50
GHz laptop having8 GB RAM . The proposed
method is validated using a performance matrix that
includes aspects like the likelihood of a false alarm Figure 5.Trusted User detection probability and
and a missed detection as well as the probabilities of missed detection probability with different values of
detecting MUs and TUs. The method is compared SNR
with Adaptive threshold spectrum energy detection
algorithm described in [7]. We have assumed Figure 5 describes the detection performance of the
rayleigh channel for simulation. proposed algorithm in different SNR environments.
As, it is clear from the graph values that probability
The performance of the proposed method's of TU detection is one for all SNR values whereas
likelihood of detection is shown in Figure 4. It is the probability of missed detection is zero. This
seen from the graph that the detection performance clean graph validates the performance of proposed
is better than adaptive threshold detection and gives method and shows that it is highly effective.
the performance of 0.98 in 0.6 (ms) only whereas the
performance of adaptive is 0.92 as well as for Friend
and foe (FOF)[8] and Tidal Trust Algorithm

5
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:06:21 UTC from IEEE Xplore. Restrictions apply.
REFERENCES
[1] H. Hu, H. Zhang and Y. -C. Liang, "On the Spectrum- and
Energy-Efficiency Tradeoff in Cognitive Radio Networks,"
in IEEE Transactions on Communications, vol. 64, no. 2, pp.
490-501, Feb. 2016, doi: 10.1109/TCOMM.2015.2505281.
[2] Deng, L., Shi, H., & Gao, Y. (2020). Certificateless Linkable
Ring Signature Scheme. IEEE Access, 8, 54641-54651.
[3] Neelam Dewangan, Arun Kumar & R. N. Patel. (2022). LSTM
Integrated AlexNet Based Cooperative Spectrum Sensing for
Cognitive Radio Network. Journal of Optoelectronics
Laser, 41(11), 28–35. Retrieved from
http://www.gdzjg.org/index.php/JOL/article/view/1292.
[4] Kumar, V., Singh, M., Patra, S.K., & Singh, P. (2020). Hybrid
CR Network: An Approach Based on Interweave- and
Underlay-Type CR Network.
[5] Rajesh Babu, C, Amutha, B. Blockchain and extreme learning
Figure 6 False Alarm probability of proposed machine based spectrum management in cognitive radio
method,FOF, TTA and adaptive threshold method networks. Trans Emerging Tel
Tech. 2022; 33:e4174. https://doi.org/10.1002/ett.4174
[6] Roy, Chirag & Yadav, Satyendra & Pal, Vipin & Singh, Mangal
The plot on False alarm probability is shown in & Patra, Sarat & Sinha, Professor G. (2021). An Ensemble
figure 6. Here, the effect has been studied against Deep Learning Model for Automatic Modulation Classification
in 5G and Beyond IoT Networks. Computational Intelligence
number of users which is varied from 10 to 100. It and Neuroscience. 2021. 1-8. 10.1155/2021/5047355
can be seen as the proposed algorithm is robust [7] Khanna, A., Rani, P., Sheikh, T.H. et al. Blockchain-Based
against number of users comparing to its Security Enhancement and Spectrum Sensing in Cognitive
Radio Network. Wireless PersCommun 127, 1899–1921 (2022).
counterparts like FOF and TTA. The missed https://doi.org/10.1007/s11277-021-08729-0
detection probability is much lowered when [8] Sabuj, S. R., Hamamura, M., &Kuwamura, S. (2015). Detection
of intelligent malicious user in cogni-tive radio network by
comparing to the adaptive threshold method. The using friend or foe (FoF) detection technique. In 2015
number of sensing nodes is an important criterion as international telecommu-nication networks and applications
it will give measure of performance on a crowded conference (ITNAC), (pp. 155–160). IEEE
[9] Rathee, G., Ahmad, F., Kerrache, C. A., & Azad, M. A. (2019).
traffic. From the above analysis it is clear that the A Trust framework to detect malicious nodes in cognitive radio
proposed method is robust against number of users networks. Electronics,8(11), 1299
and performs well in noisy environment as [10] Rathi, G., Ahmad, F., Kurugollu, F., Azad, M.A., Iqbal, R., &
Imran, M. (2020). CRT-BIoV: A Cognitive Radio Technique
compared to adaptive threshold, TTA and FOF for Blockchain-Enabled Internet of Vehicles. IEEE Transactions
algorithms. on Intelligent Transportation Systems, 22, 4005-4015..
[11] M. S. Miah, M. S. Hossain and A. G. Armada, "Machine
Learning-based Malicious Users Detection in Blockchain-
V. CONCLUSION Enabled CR-IoT Network for Secured Spectrum Access," 2022
IEEE International Symposium on Broadband Multimedia
Systems and Broadcasting (BMSB), 2022, pp. 1-6, doi:
This article describes cognitive radio’s spectrum 10.1109/BMSB55706.2022.9828700.
sensing capabilitywhen there are Malicious user [12] M. Patnaik, G. Prabhu, C. Rebeiro, V. Matyas and K.
Veezhinathan, "ProBLeSS: A Proactive Blockchain Based
(MU) present in the system. The idea of blockchains Spectrum Sharing Protocol Against SSDF Attacks in Cognitive
is used to create a brand-new method utilizing a Radio IoBT Networks," in IEEE Networking Letters, vol. 2, no.
suitable recognition approach, where all the users 2, pp. 67-70, June 2020, doi: 10.1109/LNET.2020.2976977
[13] Xie, Xinyu&Zhuhua, Hu & Chen, Min & Zhao, Yaochi& Bai,
i.e., primary user (PU) and Secondary user (SU) are Yong. (2021). An Active and Passive Reputation Method for
verified by the digital signatures and 100% Secure Wideband Spectrum Sensing Based on Blockchain.
efficiently identify the AU and MU. As a result, the Electronics. 10. 1346. 10.3390/electronics10111346.
[14] Guimarães, D.A.;Pereira, E.J.T.; Alberti, A.M.;Moreira, J.V.
spectrum sensing in CRN does not take into account Design Guidelines forDatabase-Driven Internet ofThings-
the energy detection result of MU. The MU is Enabled Dynamic SpectrumAccess.Sensors2021,21,
3194.https://doi.org/10.3390/s2109319
indefinitely prevented from participating in any [15] Kumar, V., Singh, M., Patra, S.K., Singh, P. (2020). Hybrid CR
additional processes or spectrum sensing. Network: An Approach Based on Interweave- and Underlay-
Furthermore, compared to existing models, the Type CR Network. Electronic Systems and Intelligent
Computing. Lecture Notes in Electrical Engineering, vol 686.
complexity of the blockchain-based approach is Springer, Singapore.
quite minimal.

6
Authorized licensed use limited to: De Montfort University. Downloaded on September 18,2023 at 14:06:21 UTC from IEEE Xplore. Restrictions apply.

You might also like