2015 Fifth International Conference on Communication Systems and Network Technologies 2015
DOI: 10.1109/csnt.2015.39
|View full text |Cite
|
Sign up to set email alerts
|

An Opportunistic Channel Access Scheme with Channel Ordering for Cognitive Radio Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…CN j checks if more than 50% query or suspect of malicious behavior exist, the IF CNj CVi is set as INFINITY which detects CV i as malicious node and sends warning message to the all the neighboring nodes in the network. Finally, the entry of node CV i is updated in blacklist and the malicious node CV i is discarded from the routing protocols namely OCAS [1], PRACB [6] and DMN [11] considering throughput and end-to-end delay. Fig.…”
Section: B Reliable Data Dissemination Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…CN j checks if more than 50% query or suspect of malicious behavior exist, the IF CNj CVi is set as INFINITY which detects CV i as malicious node and sends warning message to the all the neighboring nodes in the network. Finally, the entry of node CV i is updated in blacklist and the malicious node CV i is discarded from the routing protocols namely OCAS [1], PRACB [6] and DMN [11] considering throughput and end-to-end delay. Fig.…”
Section: B Reliable Data Dissemination Mechanismmentioning
confidence: 99%
“…So efficient utilization of spectrum has resulted in a challenge. To overcome this challenge, CR technology has emerged as a prominent technology which utilize the radio spectrum efficiently in a opportunistic manner [1] and thus improves spectrum efficiency. By providing CRN technology to WSN which prompts to Cognitive Radio Sensor Network (CRSN), WSN nodes capable to get the facilities of the CRNs and will be able to exploit the utilized spectrum intelligently.…”
Section: Introductionmentioning
confidence: 99%