全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Efficient Selfish Attack Detection in Cognitive Radio Network

DOI: 10.4236/wet.2016.74011, PP. 105-117

Keywords: Cognitive Radio Network, ICOOPON, COOPON, Selfish Attack

Full-Text   Cite this paper   Add to My Lib

Abstract:

The main intention of developing cognitive radio technology is to solve the spectrum deficiency problem by allocating the spectrum dynamically to the unlicensed clients. An important aim of any wireless network is to secure communication. It is to help the unlicensed clients to utilize the maximum available licensed bandwidth, and the cognitive network is designed for opportunistic communication technology. Selfish attacks cause serious security problem because they significantly deteriorate the performance of a cognitive network. In this paper, the selfish attacks have been identified using cooperative neighboring cognitive radio ad hoc network (COOPON). A novel technique has been proposed as ICOOPON (improvised COOPON), which shows improved performance in selfish attack detection as compared to existing technique. A comparative study has been presented to find the efficiency of proposed technique. The parameters used are throughput, packet delivery ratio and end to end delay.

References

[1]  Jo, M., Han, L., Kim, D. and In, H.P. (2013) Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks. Proceeding of IEEE Network, 27, 46-50.
http://dx.doi.org/10.1109/MNET.2013.6523808
[2]  Ding, L., et al. (2010) Cross-Layer Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks. IEEE Transactions on Vehicular Technology, 59, 1969-1979.
http://dx.doi.org/10.1109/TVT.2010.2045403
[3]  Wang, W.F. (2009) Spectrum Sensing for Cognitive Radio. 2009 Third International Symposium on Intelligent Information Technology Application Workshops, 21-22 November 2009.
http://dx.doi.org/10.1109/iitaw.2009.49
[4]  Akyildiz, I.F., et al. (2008) A Survey on Spectrum Management in Cognitive Radio Networks. IEEE Communications Magazine, 46, 40-48.
http://dx.doi.org/10.1109/MCOM.2008.4481339
[5]  Kim, H. and Shin, K.G. (2008) Efficient Discovery of Spectrum Opportunities with MAC-Layer Sensing in Cognitive Radio Networks. IEEE Transactions on Mobile Computing, 7, 533-545.
http://dx.doi.org/10.1109/TMC.2007.70751
[6]  Akyildiz, I.F., Lee, W.-Y., Vuran, M.C. and Mohanty, S. (2008) A Survey of Spectrum Management in Cognitive Radio Networks. Georgia Institute of Technology, IEEE Communications Magazine.
http://dx.doi.org/10.1109/MCOM.2008.4481339
[7]  Cheng, G., et al. (2007) Joint On-Demand Routing and Spectrum Assignment in Cognitive Radio Networks. 2007 IEEE International Conference on Communications IEEE, 24-28 June 2007.
http://dx.doi.org/10.1109/icc.2007.1075
[8]  Guang, L. and Assi, C. (2006) Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks. 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications IEEE, 19-21 June 2006.
http://dx.doi.org/10.1109/wimob.2006.1696387
[9]  Akyildiz, I.F., et al. (2006) NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey. Computer Networks, 50, 2127-2159.
http://dx.doi.org/10.1016/j.comnet.2006.05.001
[10]  Mai, T.V., Molnar, J.A. and Rudd, K. (2011) Security Vulnerabilities in Physical Layer of Cognitive Radio. 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS).
[11]  Chen, R.L., Park, J.-M. and Reed, J.H. (2008) Defense against Primary User Emulation Attacks in Cognitive Radio Networks. IEEE Journal on Selected Areas in Communications, 26, 25-37.
http://dx.doi.org/10.1109/JSAC.2008.080104
[12]  Wang, W.K., et al. (2009) Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks. 43rd Annual Conference on Information Sciences and Systems, 18-20 March 2009.
http://dx.doi.org/10.1109/CISS.2009.5054704
[13]  Tan, X.B. and Zhang, H. (2012) A CORDIC-Jacobi Based Spectrum Sensing Algorithm for Cognitive Radio. KSII Transactions on Internet & Information Systems, 6, 1998-2016.
http://dx.doi.org/10.3837/tiis.2012.09.001
[14]  Wagh, S., More, A. and Khavnekar, A. (2015) Identification of Selfish Attack in Cognitive Radio Ad-Hoc Networks. 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).
http://dx.doi.org/10.1109/ICCIC.2015.7435805

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413