Reference Hub1
Secure Routing and Scheduling in Ad-Hoc Cognitive Radio Networks for Public Safety

Secure Routing and Scheduling in Ad-Hoc Cognitive Radio Networks for Public Safety

Eric Chan-Tin, Qi Cheng
Copyright: © 2014 |Volume: 5 |Issue: 2 |Pages: 17
ISSN: 1947-9158|EISSN: 1947-9166|EISBN13: 9781466654525|DOI: 10.4018/ijhcr.2014040103
Cite Article Cite Article

MLA

Chan-Tin, Eric, and Qi Cheng. "Secure Routing and Scheduling in Ad-Hoc Cognitive Radio Networks for Public Safety." IJHCR vol.5, no.2 2014: pp.44-60. http://doi.org/10.4018/ijhcr.2014040103

APA

Chan-Tin, E. & Cheng, Q. (2014). Secure Routing and Scheduling in Ad-Hoc Cognitive Radio Networks for Public Safety. International Journal of Handheld Computing Research (IJHCR), 5(2), 44-60. http://doi.org/10.4018/ijhcr.2014040103

Chicago

Chan-Tin, Eric, and Qi Cheng. "Secure Routing and Scheduling in Ad-Hoc Cognitive Radio Networks for Public Safety," International Journal of Handheld Computing Research (IJHCR) 5, no.2: 44-60. http://doi.org/10.4018/ijhcr.2014040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Public safety communication is a critical component of day-to-day life. The authors propose a flexible and resilient communication system using an ad-hoc cognitive radio network that fully utilizes the available spectrum resources. Two main components of the network are addressed: route discovery, i.e., identifying multiple paths from the source to the destination, and scheduling for these paths, i.e., efficiently allocating available resources to achieve an optimal transmission. Field-based routing is adopted. The authors also introduce a secure authentication and routing mechanism for this network. The authentication component leverages the social aspect of public safety communications and mitigates most basic wireless attacks. A hybrid novel reputation scheme is then proposed to allow for efficient routing in the presence of adversaries. The authors show through simulations that the proposed secure framework can efficiently reduce the transmission delay, be robust to the dynamics of channel availability, and mitigate routing attacks in a cognitive radio network.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.