Primary user Emulation Attack Defense in Filter Bank based Cognitive Radio
نویسندگان
چکیده
منابع مشابه
Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks
Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...
متن کاملsecure collaborative spectrum sensing in the presence of primary user emulation attack in cognitive radio networks
collaborative spectrum sensing (css) is an effective approach to improve the detection performance in cognitive radio (cr) networks. inherent characteristics of the cr have imposed some additional security threats to the networks. one of the common threats is primary user emulation attack (puea). in puea, some malicious users try to imitate primary signal characteristics and defraud the cr user...
متن کاملPrimary User Emulation Attack in Cognitive Radio Networks: A Survey
Cognitive radio is a promising technology aiming to solve the spectrum scarcity problem by allocating the spectrum dynamically to unlicensed users. It uses the free spectrum bands which are not being used by the licensed users without causing interference to the incumbent transmission. So, spectrum sensing is the essential mechanism on which the entire communication depends. If the spectrum sen...
متن کاملInvestigation of Primary User Emulation Attack in Cognitive Radio Networks
Cognitive radio technology (CR), as a key enabling functionality for the next generation (xG) mobile communication, can remarkably improve the performance of a wireless communication system by being aware of the changes of its surrounding and dynamically modifying its operating parameters to adapt such changes. Recently, the security issues of cognitive radio (CR) networks have drawn more and m...
متن کاملDefense Against Secondary User Emulation Attack in Cognitive Radio Networks Using MC- MC Method
Cryptography is the process of transforming an intelligible message into one that's unintelligible and then re transforming that message back to its original form. This transformation along cryptography is done by using an algorithm. In this we propose a reliable Advanced Encryption Standard algorithm for the process of encryption and decryption. The AES (Advanced Encryption Standard) algorithm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2017
ISSN: 0974-5645,0974-6846
DOI: 10.17485/ijst/2017/v10i1/110287