Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach
نویسندگان
چکیده
Cognitive Radio Networks have recently attracted attention because of high efficiency and throughput performance. They transmit (1) repetitively collected readings (e.g. monitoring) and (2) highly confidential data (e.g. geometric location). However, the privacy and the authenticity of the transmitted data are major challenges. This paper proposes a novel steganographic technique that guarantees (1) strong end-to-end protection of the confidential information by hiding them randomly inside the normal readings using a generated key, and (2) robust evidence of authenticity for the transported readings. To expand hiding, the Walsh–Hadamard Transformation (WHT) is used to decompose normal readings into a set of coefficients. To achieve minimum distortion, only the least featured coefficients are used. To achieve high security, a key is used to reshape the coefficients into a random 2D M-by-N matrix and to generate a randomly selected order used in the hiding process. To accurately measure the distortion after hiding and extracting the confidential data, Percentage Residual Difference (PRD) has been used. It is obvious from experiments that our technique has little effect on the original readings (<1%). Also, our security evaluation proves that unauthorized retrieval of the intended confidential information within a reasonable time is highly improbable. © 2015 Elsevier B.V. All rights reserved.
منابع مشابه
A Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks
Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...
متن کاملSpectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملTowards holographic "brain" memory based on randomization and Walsh-Hadamard transformation
The holographic conceptual approach to cognitive processes in the human brain suggests that, in some parts of the brain, each part of the memory (a neuron or a group of neurons) contains some information regarding the entire data. In Dolev and Frenkel (2010, 2012) we demonstrated how to encode data in a holographic manner using the Walsh-Hadamard transform. The encoding is performed on randomiz...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAttack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack
Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Pervasive and Mobile Computing
دوره 22 شماره
صفحات -
تاریخ انتشار 2015