Performance Modeling and Analysis of Secure Registration Process of CPEs in IEEE 802.22 WRAN Cognitive Radio Network

H. Afzal, M. R. Mufti, K. T. Ahmed, M. Rehman, M. Yousaf, D. Qaseem


The proliferation of wireless technologies has affected the radio frequency spectrum which is a limited natural resource. Increase in the development of diverse wireless technologies is creating a spectrum shortage problem. The usage of radio frequency spectrum is not uniform because, some of the licensed spectrums remain vacant most of the time. A cognitive radio (CR) is one of the solutions to address this problem. Meanwhile, the popularity of cloud computing has attracted the researchers to get its benefits for the efficient utilization of cognitive radio networks (CRNs). Both of these technologies can be integrated to form a new type of network called cognitive radio cloud network in which security is one of the major issues in CRNs. This paper presents the analytical framework to perform analysis of the registration process of Customer Premises Equipment (CPE) with the base station in Wireless Regional Area Network (WRAN) in addition of the cloud platform for applying the security. The performance is investigated by comparing the scenarios of keeping the security features on and off in the system. The numerical results confirm that the proposed system works well, when security is kept on.

Full Text:



J. Mitola, “Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio”, PhD Thesis, Royal Institute of Technology, Sweden, 2000.

X. Liu, K. Zheng, L. Fu, X.Y. Liu, X. Wang and G. Dai, “Energy efficiency of secure cognitive radio networks with cooperative spectrum sharing”, IEEE Trans. Mob. Comput., vol. 18, no. 2, pp.305-318, 2019.

F.Z. El Bahi, H. Ghennioui and M. Zouak, “Spectrum sensing technique of OFDM signal under noise uncertainty based on Mean Ambiguity Function for Cognitive Radio”, Phys. Commun., vol. 33, pp.142-150, 2019.

D. Capriglione, G. Cerro, L. Ferrigno and G. Miele, “Performance analysis of a two-stage spectrum sensing scheme for dynamic spectrum access in TV bands”, Meas., vol. 135, pp.661-671, 2019.

B.S. Awoyemi, B.T. Maharaj and A.S. Alfa, “Resource allocation in heterogeneous buffered cognitive radio networks”, Wirel. Commun. Mob. Comput., vol. 1, pp. 1-12, 2017.

Federal Communications Commission, Notice of proposed rule making and order. ET Docket no. 03-222, 2003.

D.A. Fernandes, L.F. Soares, J.V. Gomes, M.M. Freire and P.R. Inácio, “Security issues in cloud environments: a survey”, Int. J. Inf. Secur., vol.13, no. 2, pp.113-170, 2014.

P. Mell and T. Grance, “The NIST definition of cloud computing”, Special Publication 800-145, National Institute of Standards and Technology, U.S. Department Commerce, 2011.

J. Köhler, K. Jünemann and H. Hartenstein, “Confidential database-as-a-service approaches: taxonomy and survey”, J. Cloud Comput., vol. 4, no. 1, p.1, 2015.

H. Patel, D. Patel, J. Chaudhari, S. Patel and K. Prajapati, “Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing”, Proc. CUBE Int. Inf. Tech. Conf., pp. 557-560, ACM. 2012.

H. Afzal, I. Awan, M.R. Mufti and R.E. Sheriff, “Modeling of initial contention window size for successful initial ranging process in IEEE 802.22 WRAN cell”, Simul. Model. Pract. Theory, vol. 51, pp.135-148, 2015.

M.R. Mufti, H. Afzal, I. Awan and A. Cullen, “A framework for dynamic selection of backoff stages during initial ranging process in wireless networks”, J. Syst. Softw., vol. 133, pp.17-27, 2017.

H. Afzal, M.R. Mufti, K.T. Ahmed, S. Ajmal and M. Yousaf, “Performance Analysis of Hybrid Spectrum Sharing in Cognitive Radio Based Wireless Regional Area Network”, The Nucleus, vol. 57, no. 1, pp.27-32, 2020.

F. Awin, E. Abdel-Raheem and K. Tepe, “Blind Spectrum Sensing Approaches for Interweaved Cognitive Radio System: A Tutorial and Short Course”, IEEE Commun. Surv. Tutor., vol. 21, no. 1, pp.238-259, 2018.

H. Afzal, I. Awan, M.R. Mufti and R.E. Sheriff, “Performance analysis of contending customer equipment in wireless networks”, J. Syst. Softw., vol. 117, pp.357-365, 2016.

J.C.R. Licklider, “Memorandum for Members and Affiliates of the Intergalactic Computer Network”, December 11, 2001.

N.N. Rojas, “CRM Review”,

D. Catteddu, “Cloud Computing: benefits, risks and recommendations for information security”, Proc. Web Appl. Secur., p. 17, Springer, Berlin, Heidelberg, 2010.

T. Zeb, M. Yousaf, H. Afzal and M.R. Mufti, "A Quantitative Security Metric Model for Security Controls: Secure Virtual Machine Migration Protocol as Target of Assessment", IEEE China Commun. vol. 15, vol. 8, pp. 126-140, 2018.

R. Chen and J.M. Park, “Ensuring trustworthy spectrum sensing in cognitive radio networks”, 1st IEEE Workshop on Networking Tech. Softw. Defined Radio Netw., pp. 110-119, 2006.

Q. Mahmoud, “Cognitive networks: towards self-aware networks”, John Wiley & Sons, 2007.

Z.M. Fadlullah, H. Nishiyama, N. Kato and M.M. Fouda, “Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks”, IEEE Netw. Mag., vol. 27, no. 3, pp. 51-56, 2013.

M.R. Manesh and N. Kaabouch, "Security Threats and Countermeasures of MAC Layer in Cognitive Radio Networks", Ad Hoc Netw., vol. 70, pp. 85-102, 2018.

K. Bian and J.M. Park, “MAC-layer misbehaviors in multi-hop cognitive radio networks”, Proc. US-Korea Conf. on Sci. Technol. Entrep., pp. 228-248, 2006.

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures”, Ad hoc Netw., vol. 1, no. 2-3, pp.293-315, 2003.

C. N. Mathur and K.P. Subbalakshmi, “Security issues in cognitive radio networks”, Cogn. Netw., vol. 25, pp.272-290, 2007.

R. K. Sharma and D.B. Rawat, "Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey", IEEE Commun. Surv. Tutor., vol. 17, no.2, pp. 1023-1043, 2015.

W. El-Hajj, H. Safa and M. Guizani, “Survey of security issues in cognitive radio networks”, J. Internet Technol., vol. 12, no. 2, pp.181-198, 2011.

L.I. Jianwu, F. Zebing, F. Zhiyong and Z. Ping, “A survey of security issues in cognitive radio networks”, IEEE China Commun., vol. 12, no. 3, pp.132-150, 2015.

H. Afzal, I. Awan, M.R. Mufti and R.E. Sheriff, “Modeling and analysis of customer premise equipments registration process in IEEE 802.22 WRAN cell”, J. Syst. Softw.,vol. 98, pp.107-116, 2014.

H. Afzal, M.R. Mufti, I. Awan and M. Yousaf, "Performance Analysis of Radio Spectrum for Cognitive Radio Wireless Networks using Discrete Time Markov Chain", J. Syst. Softw., vol. 151, pp. 1-7, 2019.

N. Nguyen-Thanh, P. Ciblat, A.T. Pham and V.T Nguyen, “Surveillance strategies against primary user emulation attack in cognitive radio networks,” IEEE Trans. Wirel. Commun., vol. 14, no. 9, pp. 4981–4993, 2015.

E.C. Muñoz, E. Rodriguez-Colina, L.F. Pedraza and I.P. Paez, "Detection of dynamic location primary user emulation on mobile cognitive radio networks using USRP", EURASIP J. Wirel. Commun. Netw., vol. 2020, no. 1, pp. 1-19, 2020.


  • There are currently no refbacks.