Detecting Selfish Secondary User for Improving the Performance of Cognitive Radio Network by Using Sad Method

نویسندگان

  • V. Jayasree
  • R. Suganya
چکیده

Cognitive radio (CR) is an opportunistic communication technology which is designed to utilize the maximum available licensed bandwidth for unlicensed users. In CR, when the spectrum is not used by primary user, it is accessed by the unlicensed users/secondary users. . In CRN a selfish SU (secondary user) broadcasts faked channel allocation information to other neighboring SUs in order to occupy all or a part of the available channels which results in severe denial of service (DoS) to CRNs. This leads to a new security threat known as the primary user emulation (PUE) attack that raises a great challenge to CRNs. So, in order to overcome this problem an innovative technique is proposed named as Selfish Attacks Detection (SAD) method to identify the selfish secondary users in the cognitive radio network. The technique detects the attacks of selfish SUs by the cooperation of other legitimate neighboring secondary users which detects only single malicious user. So, Distributed reaction mechanism is added to detect more than one selfish node. Two reaction mechanisms are proposed based upon local information, to prevent selfish misbehaviors in cognitive radio adhoc networks. The technique achieves detecting more than one selfish node and reduces the degradation in the performance of the cognitive radio networks. The main contribution of work is to improve the performance of the cognitive radio network and to detect the attacks very efficiently. An experimental result shows that the proposed method achieves high packet delivery ratio, high throughput and less delay.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating selfish primary user emulation attacks in multi-channel cognitive radio networks: A surveillance game

Primary User Emulation Attack (PUEA), in which attackers emulate primary user signals causing restriction of secondary access on the attacked channels, is a serious security problem in Cognitive Radio Networks (CRNs). An user performing a PUEA for selfishly occupying more channels is called a selfish PUEA attacker. Network managers could adopt a surveillance process on disallowed channels for i...

متن کامل

Using Fuzzy Logig Approach to Detect Selfish Attacks in Cognitive Radio Network

Cognitive radio play important role in the communication technology by solving shortage of the spectrum bands through the access of „dynamic spectrum access ‟it help for the illegal secondary users to use the more number of license bandwidth. But some malicious attack node can acquire the all spectrum bands of“multiple channels”. avoiding the other nodes from using this channels. “selfish nodes...

متن کامل

An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks

In cognitive radio networks (CRNs), the performance of the transmission control protocol (TCP) at the secondary user (SU) severely drops due to the mistrigger of congestion control. A long disruption is caused by the transmission of primary user, leading to the mistrigger. In this paper, we propose a cross-layer approach, called a CR-aware scheme that enhances TCP performance at the SU. The sch...

متن کامل

Improving the performance of recommender systems in the face of the cold start problem by analyzing user behavior on social network

The goal of recommender system is to provide desired items for users. One of the main challenges affecting the performance of recommendation systems is the cold-start problem that is occurred as a result of lack of information about a user/item. In this article, first we will present an approach, uses social streams such as Twitter to create a behavioral profile, then user profiles are clusteri...

متن کامل

Primary User Emulation Detection in Cognitive Radio Networks

Cognitive radios (CRs) have been proposed as a promising solution for improving spectrum utilization via opportunistic spectrum sharing. In a CR network environment, primary (licensed) users have priority over secondary (unlicensed) users when accessing the wireless channel. Thus, if a malicious secondary user exploits this spectrum access etiquette by mimicking the spectral characteristics of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014