Developing Security Techniques in Cognitive Networks
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Cognitive radios can be considered as smart gadgets that can gain from the
newlineexperience and progressively adjust to the highlights of the earth. Significant research
newlineendeavors have been given towards the investigation and advancement of learning and
newlinethinking methods without considering security related issues in detail.
newlineHigh security level is ensured in CRN by selecting GH based on TAHS scheme with
newlinethe involvement of major entity namely SA. In each group, spectrum sensing is
newlineperformed by ETED method which improves spectrum sensing in order to enhance
newlinePUE detection. PUE attack is detected using SSLE scheme which estimates signal
newlinesource location based on Received Signal Strength (RSS). FC maintains CNN to detect
newlineSSDF attack. Here each SUs report is compared with SA s sensing report to find
newlinemalicious activity of SUs.SSDF mitigation is taken over by isolating malicious SU from
newlinethe network. This isolation decision is made by predicting future activity of SU using
newlinetri-state MCM method. Unauthorized SUs is detected and blocked initially by CAHC algorithm. Intellectual jamming attack prevention scheme in which malevolent or malicious SU is compromised to act as supporter node is presented. Supporter node is provided with optimal channel selected by HCS-FFA algorithm. The simulator that has been used is installed on Ubuntu operating system that is NS3.Performance metrics that are considered are predication of miss detection, prediction of detection, prediction of attack strength, through put and approximation of honest nodes. Significant parameters that are considered in implementation of malevolent node based protection system research demonstrating provision of we evaluate our proposed malevolent node based protection system with other existing works MIMO strategy honeypot method , and reputation method in terms of metrics based upon performance which includes packet delivery ratio (PDR), delay, secrecy rate, SINR, and probability of false alarm.
newline
newline