2021
DOI: 10.1007/s11277-021-08786-5
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Radio Jamming Attack Detection Using an Autoencoder for CRIoT Network

Abstract: IoT network-connected devices will be kept on increasing and will cross million, but it is impossible to allocate spectrum for those million and million of the devices. This spectrum scarcity can be handled by incorporating cognitive radio-based dynamic spectrum sharing, which is referred to as Cognitive Radio Internet of Things (CRIoT). But CRIoT sufferers from the Physical layer attack in cognitive radio, which affects the spectrum sensing accuracy and reduces the spectrum utilization. There are various atta… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…The services are essential to ensure that networks are able to manage the enormous volume of network optimization data traffic generated by this user activity while preserving service quality and customer satisfaction [13]. It encompasses technology rollout, network transformation, and network optimization to provide an ideal end-user experience and operator profitability [14]. Various algorithms are employed to analyze the network status for greater precision and user satisfaction.…”
Section: Architecture Of Cognitive Radio Networkmentioning
confidence: 99%
“…The services are essential to ensure that networks are able to manage the enormous volume of network optimization data traffic generated by this user activity while preserving service quality and customer satisfaction [13]. It encompasses technology rollout, network transformation, and network optimization to provide an ideal end-user experience and operator profitability [14]. Various algorithms are employed to analyze the network status for greater precision and user satisfaction.…”
Section: Architecture Of Cognitive Radio Networkmentioning
confidence: 99%
“…The path with the highest PoS is selected. After that, the actual PoS of the selected path, say path p, PoS p mem , is found using (15).…”
Section: B Simulation Evaluation 1) Simulation Setupmentioning
confidence: 99%
“…Moreover, CRNs require should be aware about jamming by malicious attackers that interrupt SUs transmission, hence the end-to-end throughput is negatively affected. Thus, different protection protocols were developed to protect the SUs transmission [15], [16]. On the other hand, sometimes the channels are heterogeneous in terms of capacity, interference, harmful environmental noise, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Where the jammers aim to indiscriminately advance their Jammer Received Signal Strength (JRSS), and the intruder's target is to decrease the overall privacy rate. In comparison to old strategies, a numerical number of outputs have verified and proven that the implemented game strategies are successful against the attackers with reference to data rate, secrecy rate and latency [1][2][3].…”
Section: Introductionmentioning
confidence: 97%