2021
DOI: 10.1007/s11277-021-09025-7
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Malicious Secondary User Presence Within Primary User Range in Cognitive Radio Networks

Abstract: Cognitive Radio (CR) is a widely used wireless radio communication to utilize the available spectrum space of licensed users (Primary Users) efficiently. The primary Users (PU) unused spectrum space for a particular period is allocated to the Secondary Users (SU). The most alarming issue in this assignment is security, in which the secondary users disguise as primary users and misuses the allotted spectrum. To address this issue, in this paper we have proposed the Boundary detection method that uses the estima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…The number of sub-puzzles in the given cluster head puzzle is denoted by d, which determines the difficulty level of solving the puzzle. Therefore, the sub-puzzle of puzzle, Pm is denoted as, Pm = Pm [1], Pm [2], Pm [3] We assume that, the server is under attack, if the buffer b is full and hence the requesting client will be given with a puzzle to solve, before initiating the protocol PC. The Client request to initiate PCi, is possible only if the client solves the puzzle and gives solution to puzzle P within the time slot T1, the time until which the puzzle is valid.…”
Section: Construction Of Crack the Puzzle Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…The number of sub-puzzles in the given cluster head puzzle is denoted by d, which determines the difficulty level of solving the puzzle. Therefore, the sub-puzzle of puzzle, Pm is denoted as, Pm = Pm [1], Pm [2], Pm [3] We assume that, the server is under attack, if the buffer b is full and hence the requesting client will be given with a puzzle to solve, before initiating the protocol PC. The Client request to initiate PCi, is possible only if the client solves the puzzle and gives solution to puzzle P within the time slot T1, the time until which the puzzle is valid.…”
Section: Construction Of Crack the Puzzle Protocolmentioning
confidence: 99%
“…One of the alarming issues in wireless communication is the lack of spectrum space available to meet the growing needs due to the presence of several smart and advanced wireless technologies. Cognitive Radio Networks (CRN) acts as a bridge between the needs and demands by properly utilizing and allocating the spectrum space [1]. CRN is a self-organizing network in which the allocation and reconfiguration happen dynamically depending on the free space availability and need [2].…”
Section: Introductionmentioning
confidence: 99%
“…In the intrusion detection system, the automatic response module usually has a higher priority. The problems of the information analysis module, the expansion of the network scale, the gradual accumulation of the amount of data generated in the network, and the requirements for the efficient analysis and processing capability of the intrusion detection system are also increasing [17][18].…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…The PUEA is one of major challenge, where the authorized network can be accessed by the unauthorized or fake people who intrude between PU and SU which provide major loss of security over the network. The PUEA act can be identified by recognizing the malicious activities in the frequency network [1] [2] [3].…”
Section: Introductionmentioning
confidence: 99%