IJWMT Vol. 13, No. 6, 8 Dec. 2023
Cover page and Table of Contents: PDF (size: 568KB)
Full Text (PDF, 568KB), PP.32-38
Views: 0 Downloads: 0
Blockchain Technology, Byzantine attack, Security, Lamport-Shostak-Pease Algorithm, Secure Blockchains and Cognitive Radio
In the past couple of years, the research on the Byzantine attack and its defense strategies has gained the worldwide increasing attention. In this paper, we present a secure protocol to escape from the Byzantine attack in the cognitive radio networks. This protocol is implemented using the Lamport-Shostak-Pease algorithm and blockchain technology. A reliable distributed computing system must be able to handle the faulty components to deliver the error less performance. These faulty components send the conflicting information to the other parts of the system. As a result, it creates a problem which is similar to the Byzantine Generals Problem (BGP). In order to design a reliable system, it is necessary to identify and overlook such faulty components.
In the cognitive radio networks, there are the two types of users i.e. primary and secondary users. The primary users hold the licensed spectrum whereas the secondary users hold the leased spectrum. In these CR networks, there can be a similar problem like BGP while allocating the spectrum to the secondary users. Also, it requires all the users to agree on a common value, even with some faulty users in the network. This is called as the Byzantine Agreement. Here we have addressed this Byzantine General problem to develop a reliable and secure spectrum allocation using the Lamport-Shostak-Pease algorithm. It can solve the BGP for n≥3m+1 users in the presence of ‘m’ faulters. In this implementation, the blockchain technology is used as the efficient decentralized database which records all the transactions of the users, like exchanging currency, mining, updating the blockchain and auctioning the spectrum for lease.
Amith K S, Yerriswamy T, "Mitigation of Byzantine attack using LSP algorithm in CR Networks through Blockchain Technology", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.13, No.6, pp. 32-38, 2023. DOI:10.5815/ijwmt.2023.06.04
[1]S. Parshutina, Bogatyrev, "Models to support design of highly reliable distributed computer systems with redundant processes of data transmission and handling, " IEEE, International Conference Quality Management, Transport and Information Security, Information Technologies ", June 2017, volume 01, p. p. 096 - 099.
[2]P. Anand, et al., "Collaborative spectrum sensing in the presence of Byzantine attacks in Cognitive Radio Networks, " IEEE, second International Conference on COMmunication System & NETworks, April 2010, volume 01, p. p. 01 - 09.
[3]M. Kim, et al., "On counteracting Byzantine attacks in network coded peer – to - peer networks, " in IEEE Journal on Selected Areas in Communications, volume 028, no. 05, volume 01, p. p. 0692 - 0702, June 2010.
[4]V. K. Garg and J. Bridgman, "The Weighted Byzantine Agreement Problem, " IEEE International Parallel and Distributed Processing Symposium, May 2011, volume 11, p. p. 0524 - 0531.
[5]J. Ren, Zhang, et. al., "Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks, " in IEEE Transactions on Wireless Communications, volume 14, no. 10, p. p. 06813 - 06827, Dec-16.
[6]A. Sivakumaran, Alfa and Maharaj, "An Empirical Analysis of the Effect of Malicious Users in Decentralized Cognitive Radio Networks," IEEE 89th Vehicular Technology Conference, Aug 2019, volume 021, p. p. 01 - 05.
[7]J. Kelly, Ashdown, "Spectrum Sensing Falsification Detection in Dense Cognitive Radio Networks using a Greedy Method, " NAECON - 2018, IEEE National Aerospace & Electronics Conference, May 2018, volume 31, p. p. 0144 - 0151.
[8]M. B. H. Weiss, et al., "On the Application of Blockchains to Spectrum Management, " in IEEE Transactions on Cognitive Communications & Networking, volume 5, no. 2, p. p. 0193 - 0205, Mar 2019.
[9]N. C. Luong, , et al., "Joint Transaction Transmission and Channel Selection in Cognitive Radio Based Blockchain Networks: A Deep Reinforcement Learning Approach, " IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2019, volume 13, p. p. 08409 - 08413.
[10]K. Kotobi and Bilén, "Blockchain-enabled spectrum access in cognitive radio networks, " IEEE Wireless Telecommunications Symposium, May 2017, volume 02, p. p. 01 - 06.
[11]J. Du, et al., "A byzantine attack defender for censoring-enabled cognitive radio networks, " International Conference on Wireless Communications and Signal Processing, Jun 2015, volume 14, p. p. 01 - 06.
[12]Fernando C, "Using Byzantine Agreement in the Design Of IPS Systems," IEEE International Performance, Computing, & Communications Conference, Jun 2007, p. p. 0528 - 0537.
[13]Linyuan Zhang, Guoru Ding, et al., "Byzantine Attack and Defense in Cognitive Radio Networks: A Survey, " in IEEE Communications Surveys and Tutorials, volume. 017, no. 03, p. p. 01342 - 01363, Dec 2015.
[14]Ankit S. Rawat, Priyanka Anand, Chen and Varshne, "Countering byzantine attacks in CRNs, " IEEE International Conference on Acoustics, Speech and Signal Processing, Dallas, 2010, volume 15, p.p. 03098 - 03101.
[15]L. Zhang, et al., "Defending Against Byzantine Attack in Cooperative Spectrum Sensing: Defense Reference and Performance Analysis, " in IEEE Access, volume 04, p.p. 04011 - 04024, Apr 2016.
[16]Fulai Liu, et al., "Dynamic attack probability based Spectrum Sensing against Byzantine attack in Cognitive Radio," 2nd IEEE International Conference on Computer & Communications, 2016, p. p. 01494 - 01498.
[17]Jun Wu et al., "Generalized Byzantine Attack and Defense in Cooperative Spectrum Sensing for CRNs, " in IEEE Access, volume 06, p. p. 53272 - 53286, Mar 2018.
[18]B. Kasirii, et al., "Secure cooperative multi-channel spectrum sensing in CRNs, " Military Communications Conference, Baltimor, May 2011, volume 18, p. p. 0272 - 0276
[19]F. Tao, et al., "Security Random Network Coding Model against Byzantine Attack Based on CBC," 4th International Conference on Intelligent Computation Technology & Automation, Mar 2011, volume 17, p.p. 01178 - 01181