학술논문

Multi-selfish attacks and detection in cognitive radio network using CRV
Document Type
Conference
Source
2017 International Conference on Computing Methodologies and Communication (ICCMC) Computing Methodologies and Communication (ICCMC), 2017 International Conference on. :571-574 Jul, 2017
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Cognitive radio
Security
Ad hoc networks
Conferences
Routing
Communication system security
Cognitive Radio Network
Primary Users
Secondary Users
Selfish nodes
CRV algorithm
Language
Abstract
Recent developments of the wireless communication technology lead to the problem of growing spectrum scarcity and spectrum shortage. Most of the frequency spectrum has already been licensed by the government agencies such as Federal Communications Commission (FCC). There exists a spectrum scarcity for new wireless applications and different services. Cognitive radio (CR) is used to solve the spectrum scarcity problem by utilizing the spectrum dynamically. Cognitive Radio can utilize the unused or free spectrum for the secondary usage without interfering a primary licensed user. The cognitive radio network is vulnerable to several harmful attacks launched intentionally or unintentionally. Because of different attacks, security in cognitive radio networks is still an open challenge. The main focus of this research paper is to detect selfish node in cognitive radio network. Here, a method which uses Credit Risk Value (CRV) is being proposed to identify the selfish users to improve the network performance.