Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach

نویسندگان

  • Alsharif Abuadbba
  • Ibrahim Khalil
  • Mohammed Atiquzzaman
چکیده

Cognitive Radio Networks have recently attracted attention because of high efficiency and throughput performance. They transmit (1) repetitively collected readings (e.g. monitoring) and (2) highly confidential data (e.g. geometric location). However, the privacy and the authenticity of the transmitted data are major challenges. This paper proposes a novel steganographic technique that guarantees (1) strong end-to-end protection of the confidential information by hiding them randomly inside the normal readings using a generated key, and (2) robust evidence of authenticity for the transported readings. To expand hiding, the Walsh–Hadamard Transformation (WHT) is used to decompose normal readings into a set of coefficients. To achieve minimum distortion, only the least featured coefficients are used. To achieve high security, a key is used to reshape the coefficients into a random 2D M-by-N matrix and to generate a randomly selected order used in the hiding process. To accurately measure the distortion after hiding and extracting the confidential data, Percentage Residual Difference (PRD) has been used. It is obvious from experiments that our technique has little effect on the original readings (<1%). Also, our security evaluation proves that unauthorized retrieval of the intended confidential information within a reasonable time is highly improbable. © 2015 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks

Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...

متن کامل

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Towards holographic "brain" memory based on randomization and Walsh-Hadamard transformation

The holographic conceptual approach to cognitive processes in the human brain suggests that, in some parts of the brain, each part of the memory (a neuron or a group of neurons) contains some information regarding the entire data. In Dolev and Frenkel (2010, 2012) we demonstrated how to encode data in a holographic manner using the Walsh-Hadamard transform. The encoding is performed on randomiz...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Pervasive and Mobile Computing

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2015