2020
DOI: 10.1007/s11277-020-07294-2
|View full text |Cite
|
Sign up to set email alerts
|

Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…The routing of the cognitive radio system contains many limitations in misbehaving actions and securing routing messages and requests. Vivekanand and Bagan [23] have developed an enhanced LEACH protocol for obtaining distance and preventing attacks. The Cognitive radio system contained nodes clustered through enhanced LEACH.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The routing of the cognitive radio system contains many limitations in misbehaving actions and securing routing messages and requests. Vivekanand and Bagan [23] have developed an enhanced LEACH protocol for obtaining distance and preventing attacks. The Cognitive radio system contained nodes clustered through enhanced LEACH.…”
Section: Related Workmentioning
confidence: 99%
“…There are many techniques introduced to overcome these issues. The existing techniques [17], like the energy-efficient routing procedure [21], the clustering method [22], the routing protocol [23], and the LEACH protocol [24], still have the issues of scalability, network lifetime, and energy consumption [18,19]. The problem in the previous study is lacking monitoring mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…To detect the Primary User Emulation Attacks in Cognitive Radio networks in paper [16], two hypothesis testing mechanisms namely Neyman-Pearson composite hypothesis test (NPCHT) and a Wald's sequential probability ratio test (WSPRT) was presented by the author. From the research, it was found that WSPRT showed a 50& reduction in successful PUEA than NPCHT.…”
Section: Related Workmentioning
confidence: 99%
“…With the improper spectrum sensing results, the spectrum utilization will be degraded. The most common attacks in CR-IoV are Spectrum Sensing Data Falsification (SSDF) attacks and Primary User Emulation (PUE) attacks [13,14]. In the SSDF attack, the attacker attempts to send false sensing reports on the PU absence to the fusion center (FC) or cognitive base station (CBS) [15].…”
Section: Introductionmentioning
confidence: 99%