Cognitive radio networks for detecting malicious nodes

ISSN: 22773878
0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

Abstract

Nowadays cognitive radio technologies are emerging technology for effective communication with high throughput. For analyzing effective wireless communication we surveyed several journals and discussed in the section II. SDR also implemented for easy implementation. Spectrum utilization is a major role for a better communication. Each PU has a unique license but sometimes, primary user not using their spectrum. In cognitive radio allow secondary user for using unused licensed spectrum of PU but many secondary users try to access PU at a same time and its leads to primary emulation attack. So first we studied how to avoid primary emulation attack. PEA reduced by using request priority if one SU only access the PU at a time other SU were in the wait state. Analyzing SU request all times. Attackers send many requests to the resources node then if request reach beyond threshold limits means immediately PU block that attacker node. Each node configured with standard bandwidth. Each nodes were estimated with several parameters like signal strength, battery level, distance etc.. in proposed method first formed a own ad-hoc network structure. Protecting PU from an attackers using threshold analysis method. We survived several authors’ works and demonstrated our results in section III using ns2 simulator. We improved 6-7% percentage throughput and minimized interference also.

Cite

CITATION STYLE

APA

Kongkham, D., & Sundararajan, M. (2019). Cognitive radio networks for detecting malicious nodes. International Journal of Recent Technology and Engineering, 7(6), 646–653.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free