Performance Modeling and Analysis of Secure Registration Process of CPEs in IEEE 802.22 WRAN Cognitive Radio Network


  • H. Afzal Department of Computer Science, Bahauddin Zakariya University, Multan, Pakistan.
  • M. R. Mufti COMSATS University Islamabad, Vehari Campus Vehari
  • K. T. Ahmed Department of Computer Science, Bahauddin Zakariya University, Multan, Pakistan.
  • M. Rehman Department of Information Technology, Government College University Faisalabad. Pakistan.
  • M. Yousaf Riphah Institute of Systems Engineering, Riphah International University, Islamabad, Pakistan.
  • D. Qaseem Department of Computer Science, COMSATS University Islamabad, Vehari Campus Vehari, Pakistan.


The proliferation of wireless technologies has affected the radio frequency spectrum which is a limited natural resource. Increase in the development of diverse wireless technologies is creating a spectrum shortage problem. The usage of radio frequency spectrum is not uniform because, some of the licensed spectrums remain vacant most of the time. A cognitive radio (CR) is one of the solutions to address this problem. Meanwhile, the popularity of cloud computing has attracted the researchers to get its benefits for the efficient utilization of cognitive radio networks (CRNs). Both of these technologies can be integrated to form a new type of network called cognitive radio cloud network in which security is one of the major issues in CRNs. This paper presents the analytical framework to perform analysis of the registration process of Customer Premises Equipment (CPE) with the base station in Wireless Regional Area Network (WRAN) in addition of the cloud platform for applying the security. The performance is investigated by comparing the scenarios of keeping the security features on and off in the system. The numerical results confirm that the proposed system works well, when security is kept on.

Author Biography

M. R. Mufti, COMSATS University Islamabad, Vehari Campus Vehari

Assistant Professor in Department of Computer Science


J. Mitola, “Cognitive Radio: An Integrated Agent Architecture for Software Defined Radioâ€, PhD Thesis, Royal Institute of Technology, Sweden, 2000.

X. Liu, K. Zheng, L. Fu, X.Y. Liu, X. Wang and G. Dai, “Energy efficiency of secure cognitive radio networks with cooperative spectrum sharingâ€, IEEE Trans. Mob. Comput., vol. 18, no. 2, pp.305-318, 2019.

F.Z. El Bahi, H. Ghennioui and M. Zouak, “Spectrum sensing technique of OFDM signal under noise uncertainty based on Mean Ambiguity Function for Cognitive Radioâ€, Phys. Commun., vol. 33, pp.142-150, 2019.

D. Capriglione, G. Cerro, L. Ferrigno and G. Miele, “Performance analysis of a two-stage spectrum sensing scheme for dynamic spectrum access in TV bandsâ€, Meas., vol. 135, pp.661-671, 2019.

B.S. Awoyemi, B.T. Maharaj and A.S. Alfa, “Resource allocation in heterogeneous buffered cognitive radio networksâ€, Wirel. Commun. Mob. Comput., vol. 1, pp. 1-12, 2017.

Federal Communications Commission, Notice of proposed rule making and order. ET Docket no. 03-222, 2003.

D.A. Fernandes, L.F. Soares, J.V. Gomes, M.M. Freire and P.R. Inácio, “Security issues in cloud environments: a surveyâ€, Int. J. Inf. Secur., vol.13, no. 2, pp.113-170, 2014.

P. Mell and T. Grance, “The NIST definition of cloud computingâ€, Special Publication 800-145, National Institute of Standards and Technology, U.S. Department Commerce, 2011.

J. Köhler, K. Jünemann and H. Hartenstein, “Confidential database-as-a-service approaches: taxonomy and surveyâ€, J. Cloud Comput., vol. 4, no. 1, p.1, 2015.

H. Patel, D. Patel, J. Chaudhari, S. Patel and K. Prajapati, “Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computingâ€, Proc. CUBE Int. Inf. Tech. Conf., pp. 557-560, ACM. 2012.

H. Afzal, I. Awan, M.R. Mufti and R.E. Sheriff, “Modeling of initial contention window size for successful initial ranging process in IEEE 802.22 WRAN cellâ€, Simul. Model. Pract. Theory, vol. 51, pp.135-148, 2015.

M.R. Mufti, H. Afzal, I. Awan and A. Cullen, “A framework for dynamic selection of backoff stages during initial ranging process in wireless networksâ€, J. Syst. Softw., vol. 133, pp.17-27, 2017.

H. Afzal, M.R. Mufti, K.T. Ahmed, S. Ajmal and M. Yousaf, “Performance Analysis of Hybrid Spectrum Sharing in Cognitive Radio Based Wireless Regional Area Networkâ€, The Nucleus, vol. 57, no. 1, pp.27-32, 2020.

F. Awin, E. Abdel-Raheem and K. Tepe, “Blind Spectrum Sensing Approaches for Interweaved Cognitive Radio System: A Tutorial and Short Courseâ€, IEEE Commun. Surv. Tutor., vol. 21, no. 1, pp.238-259, 2018.

H. Afzal, I. Awan, M.R. Mufti and R.E. Sheriff, “Performance analysis of contending customer equipment in wireless networksâ€, J. Syst. Softw., vol. 117, pp.357-365, 2016.

J.C.R. Licklider, “Memorandum for Members and Affiliates of the Intergalactic Computer Networkâ€, December 11, 2001.

N.N. Rojas, “CRM Reviewâ€,

D. Catteddu, “Cloud Computing: benefits, risks and recommendations for information securityâ€, Proc. Web Appl. Secur., p. 17, Springer, Berlin, Heidelberg, 2010.

T. Zeb, M. Yousaf, H. Afzal and M.R. Mufti, "A Quantitative Security Metric Model for Security Controls: Secure Virtual Machine Migration Protocol as Target of Assessment", IEEE China Commun. vol. 15, vol. 8, pp. 126-140, 2018.

R. Chen and J.M. Park, “Ensuring trustworthy spectrum sensing in cognitive radio networksâ€, 1st IEEE Workshop on Networking Tech. Softw. Defined Radio Netw., pp. 110-119, 2006.

Q. Mahmoud, “Cognitive networks: towards self-aware networksâ€, John Wiley & Sons, 2007.

Z.M. Fadlullah, H. Nishiyama, N. Kato and M.M. Fouda, “Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networksâ€, IEEE Netw. Mag., vol. 27, no. 3, pp. 51-56, 2013.

M.R. Manesh and N. Kaabouch, "Security Threats and Countermeasures of MAC Layer in Cognitive Radio Networks", Ad Hoc Netw., vol. 70, pp. 85-102, 2018.

K. Bian and J.M. Park, “MAC-layer misbehaviors in multi-hop cognitive radio networksâ€, Proc. US-Korea Conf. on Sci. Technol. Entrep., pp. 228-248, 2006.

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasuresâ€, Ad hoc Netw., vol. 1, no. 2-3, pp.293-315, 2003.

C. N. Mathur and K.P. Subbalakshmi, “Security issues in cognitive radio networksâ€, Cogn. Netw., vol. 25, pp.272-290, 2007.

R. K. Sharma and D.B. Rawat, "Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey", IEEE Commun. Surv. Tutor., vol. 17, no.2, pp. 1023-1043, 2015.

W. El-Hajj, H. Safa and M. Guizani, “Survey of security issues in cognitive radio networksâ€, J. Internet Technol., vol. 12, no. 2, pp.181-198, 2011.

L.I. Jianwu, F. Zebing, F. Zhiyong and Z. Ping, “A survey of security issues in cognitive radio networksâ€, IEEE China Commun., vol. 12, no. 3, pp.132-150, 2015.

H. Afzal, I. Awan, M.R. Mufti and R.E. Sheriff, “Modeling and analysis of customer premise equipments registration process in IEEE 802.22 WRAN cellâ€, J. Syst. Softw.,vol. 98, pp.107-116, 2014.

H. Afzal, M.R. Mufti, I. Awan and M. Yousaf, "Performance Analysis of Radio Spectrum for Cognitive Radio Wireless Networks using Discrete Time Markov Chain", J. Syst. Softw., vol. 151, pp. 1-7, 2019.

N. Nguyen-Thanh, P. Ciblat, A.T. Pham and V.T Nguyen, “Surveillance strategies against primary user emulation attack in cognitive radio networks,†IEEE Trans. Wirel. Commun., vol. 14, no. 9, pp. 4981–4993, 2015.

E.C. Muñoz, E. Rodriguez-Colina, L.F. Pedraza and I.P. Paez, "Detection of dynamic location primary user emulation on mobile cognitive radio networks using USRP", EURASIP J. Wirel. Commun. Netw., vol. 2020, no. 1, pp. 1-19, 2020.




How to Cite

H. Afzal, M. R. Mufti, K. T. Ahmed, M. Rehman, M. Yousaf, and D. Qaseem, “Performance Modeling and Analysis of Secure Registration Process of CPEs in IEEE 802.22 WRAN Cognitive Radio Network”, The Nucleus, vol. 57, no. 4, pp. 141–149, Sep. 2021.