The main
intention of developing cognitive radio technology is to solve the spectrum
deficiency problem by allocating the spectrum dynamically to the unlicensed
clients. An important aim of any wireless network is to secure communication.
It is to help the unlicensed clients to utilize the maximum available licensed
bandwidth, and the cognitive network is designed for opportunistic
communication technology. Selfish attacks cause serious security problem
because they significantly deteriorate the performance of a cognitive network.
In this paper, the selfish attacks have been identified using cooperative neighboring
cognitive radio ad hoc network (COOPON). A novel technique has been proposed as
ICOOPON (improvised COOPON), which shows improved performance in selfish attack
detection as compared to existing technique. A comparative study has been
presented to find the efficiency of proposed technique. The parameters used are
throughput, packet delivery ratio and end to end delay.
References
[1]
Jo, M., Han, L., Kim, D. and In, H.P. (2013) Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks. Proceeding of IEEE Network, 27, 46-50. http://dx.doi.org/10.1109/MNET.2013.6523808
[2]
Ding, L., et al. (2010) Cross-Layer Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks. IEEE Transactions on Vehicular Technology, 59, 1969-1979. http://dx.doi.org/10.1109/TVT.2010.2045403
[3]
Wang, W.F. (2009) Spectrum Sensing for Cognitive Radio. 2009 Third International Symposium on Intelligent Information Technology Application Workshops, 21-22 November 2009. http://dx.doi.org/10.1109/iitaw.2009.49
[4]
Akyildiz, I.F., et al. (2008) A Survey on Spectrum Management in Cognitive Radio Networks. IEEE Communications Magazine, 46, 40-48. http://dx.doi.org/10.1109/MCOM.2008.4481339
[5]
Kim, H. and Shin, K.G. (2008) Efficient Discovery of Spectrum Opportunities with MAC-Layer Sensing in Cognitive Radio Networks. IEEE Transactions on Mobile Computing, 7, 533-545. http://dx.doi.org/10.1109/TMC.2007.70751
[6]
Akyildiz, I.F., Lee, W.-Y., Vuran, M.C. and Mohanty, S. (2008) A Survey of Spectrum Management in Cognitive Radio Networks. Georgia Institute of Technology, IEEE Communications Magazine. http://dx.doi.org/10.1109/MCOM.2008.4481339
[7]
Cheng, G., et al. (2007) Joint On-Demand Routing and Spectrum Assignment in Cognitive Radio Networks. 2007 IEEE International Conference on Communications IEEE, 24-28 June 2007. http://dx.doi.org/10.1109/icc.2007.1075
[8]
Guang, L. and Assi, C. (2006) Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks. 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications IEEE, 19-21 June 2006. http://dx.doi.org/10.1109/wimob.2006.1696387
[9]
Akyildiz, I.F., et al. (2006) NeXt Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey. Computer Networks, 50, 2127-2159. http://dx.doi.org/10.1016/j.comnet.2006.05.001
[10]
Mai, T.V., Molnar, J.A. and Rudd, K. (2011) Security Vulnerabilities in Physical Layer of Cognitive Radio. 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS).
[11]
Chen, R.L., Park, J.-M. and Reed, J.H. (2008) Defense against Primary User Emulation Attacks in Cognitive Radio Networks. IEEE Journal on Selected Areas in Communications, 26, 25-37. http://dx.doi.org/10.1109/JSAC.2008.080104
[12]
Wang, W.K., et al. (2009) Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks. 43rd Annual Conference on Information Sciences and Systems, 18-20 March 2009. http://dx.doi.org/10.1109/CISS.2009.5054704
[13]
Tan, X.B. and Zhang, H. (2012) A CORDIC-Jacobi Based Spectrum Sensing Algorithm for Cognitive Radio. KSII Transactions on Internet & Information Systems, 6, 1998-2016. http://dx.doi.org/10.3837/tiis.2012.09.001
[14]
Wagh, S., More, A. and Khavnekar, A. (2015) Identification of Selfish Attack in Cognitive Radio Ad-Hoc Networks. 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). http://dx.doi.org/10.1109/ICCIC.2015.7435805