Downloads: 113 | Views: 293
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.7 / 10
Modified Belief Propagation-Based Defense against Routing Toward Primary User Attack in Cognitive Radio Networks
Dhanashree Yogesh Jangam, Aruna K. Gupta
Abstract: Current wireless networks are characterized by a static spectrum allocation policy, where governmental agencies assign wireless spectrum to license holders on a long term basis for large geographical regions ISM band has enabled the explosion of new technologies that is Wi-Fi due to this its license is free from characteristic. The widespreadadoption of Wi-Fi technology, combined with the rapid penetration of smart phonesrunning popular user services has overcrowded substantially the ISM band. Cognitive radio (CR) networks have involved many attentions newly, whilethe security issues are not yet studied fully. In this approach, propose a new and powerfulnetwork layer attack called routing-toward-primary-user (RPU) attack in Cognitive Radio networks. In this attack malicious nodes intentionally route a large amount of packets In this approach, suggest a new and powerful network layer attack called routing toward-primary-user (RPU) attack in Cognitive Radio networks. In this attack malicious nodes intentionally route a large amount of packets toward the primary users (PUs), purpose of malicious node is to cause interference to the PUs and to increase delay in thedata transmission among the secondary users. The main objective of the proposed work is to minimize the time for sendingthe data, and send the data by the path which is the longest distance from the primaryuser network. For that the pre belief value is calculated. , belief propagation used to develop a defense strategy. Here a initial rout establish from source to destination, then according to it the each node keeps a feedback of other node on the route, compute belief, exchanges of feedback in a table record. On the basis of final belief values, the source node detects the malicious path.
Keywords: Belief propagation, Cognitive, Modified BP, Radio Network, Routing toward primary user attack, security
Edition: Volume 3 Issue 7, July 2014
Pages: 866 - 871
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 672 - 675Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio
Shashank Dhananjaya, Yuvaraju B N
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 11, November 2021
Pages: 1220 - 1223Emotion Detector and Counsellor Chatbox
Lingamgunta Nikhilesh
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 1563 - 1571An Energy Aware Routing for Cognitive Radio Wireless Sensor Network using FuzzyQ
Vidya E V, Dr. B. S. Shylaja
Downloads: 7 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 9, September 2023
Pages: 1263 - 1266Neuralink: Spearheading the Point of Interaction among Brain and Machine
Ahdil Singh, Vikas Kumar
Downloads: 16 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021
Pages: 450 - 455Introduction to Human Computer Interaction
Aitham Suhas