2023
DOI: 10.1109/access.2023.3312291
|View full text |Cite
|
Sign up to set email alerts
|

BDDTPA: Blockchain-Driven Deep Traffic Pattern Analysis for Enhanced Security in Cognitive Radio Ad-Hoc Networks

Debabrata Dansana,
Prafulla Kumar Behera,
Abdulbasit A. Darem
et al.

Abstract: Cognitive Radio Ad-hoc Networks (CRAHNs) combines characteristics of ad-hoc networks with cognitive radios to facilitate a variety of communication scenarios. However, these networks are subject to persistent attacks from internal and external adversaries, such as Masquerading, Spoofing, Spying, and Distributed Denial of Service (DDoS). Existing deep learning models proposed to counter these attacks suffer from complexity, real-time processing limitations, and a lack of network scalability. In addition, their … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(11 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…Where, 𝑑𝑠 π‘Ÿπ‘’π‘Žπ‘β„Ž &𝑑𝑠 π‘ π‘‘π‘Žπ‘Ÿπ‘‘ represents the timestamps at which the nodes reach to the destination location and start from the source locations. The delay performance was compared with TRS [6], BDDTPA [8], and DRLPB [23] in figure 2 As the number of routing communications (NM) increases, we observe that the delay in IGRMQITS consistently outperforms the other models. For instance, when NM is 25,000, IGRMQITS achieves a significantly lower delay of 8.71 seconds, compared to TRS (11.38 s), BDDTPA (12.90 s), and DRLPB (14.72 s).…”
Section: Experimental Executionmentioning
confidence: 96%
See 3 more Smart Citations
“…Where, 𝑑𝑠 π‘Ÿπ‘’π‘Žπ‘β„Ž &𝑑𝑠 π‘ π‘‘π‘Žπ‘Ÿπ‘‘ represents the timestamps at which the nodes reach to the destination location and start from the source locations. The delay performance was compared with TRS [6], BDDTPA [8], and DRLPB [23] in figure 2 As the number of routing communications (NM) increases, we observe that the delay in IGRMQITS consistently outperforms the other models. For instance, when NM is 25,000, IGRMQITS achieves a significantly lower delay of 8.71 seconds, compared to TRS (11.38 s), BDDTPA (12.90 s), and DRLPB (14.72 s).…”
Section: Experimental Executionmentioning
confidence: 96%
“…This is especially important in healthcare scenarios where real-time data transmission can be a matter of life and death, making IGRMQITS a promising solution for enhancing IoMT network performance.Similar performance was estimated for energy consumption via equation 29, and tabulated in figure 3 The Energy (E) required to perform routing in Internet of Medical Things (IoMT) Networks, measured in milliwatts (mW), is a critical parameter that directly affects the power consumption and efficiency of the network devices. Here, we compare the energy consumption results between the proposed Incremental Graph-based Routing Model for QoS enhancement in dense IoMT Networks using Truncated Sidechains (IGRMQITS) and three existing models: TRS [6], BDDTPA [8], and DRLPB [23]. The results are presented for IGRMQITS consistently demonstrates lower energy consumption compared to the other models across varying NM values.…”
Section: Experimental Executionmentioning
confidence: 99%
See 2 more Smart Citations
“…A different layer of security attacks in CRAHNs is discussed in [44], where the authors discussed attacks like Collision, Denial-of-service (DoS), Exhaustion, Selective Forwarding, Sinkhole, Sybil, Wormhole Hello Flood, SYN Flooding, De-Synchronizing, Logical Error Buffer Overflow, Primary User Emulation Attack (PUEA), jamming, Traffic Analysis, Attack on Data privacy and location Privacy. The proof-of-trust (PoT) consensus mechanism is managed via a Genetic Algorithm (GA)--based sidechaining model that the authors used for the security in CRAHNs [45]. In the domain of smart contracts for blockchain applications, recent scholarly work has highlighted the challenges in their adaptability and the limitations in source code reusability, primarily restricted to cloning practices.…”
Section: Literature Surveymentioning
confidence: 99%