International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 123 | Views: 307

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.2 / 10


     

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Suchita S. Potdar, Dr. Mallikarjun


Abstract: Cognitive radio is an opportunistic communication technology designed to help unlicensed users to utilize the maximum available licensed bandwidth. Cognitive radio has recently attracted a lot of research interest. However, little research has been done regarding security in cognitive radio, while much more work has been done on spectrum sensing and allocation problems. A selfish cognitive radio node can occupy all or part of the resources of multiple channels, prohibiting other cognitive radio nodes from accessing these resources. Selfish cognitive radio attacks deals with serious security problem like fake signal attack, Channel pre-occupation attack. These security problems they significantly degrade the performance of a cognitive radio network. In this proposal we identify the types of selfish attacks in cognitive radio ad-hoc networks and propose an easy and efficient selfish cognitive radio attack detection technique using Markov chain model and Game Theory. This technique is simple and reliable and can be well fitted for practical work in future work.


Keywords: Cognitive Radio, Markov Chain, Game Theory


Edition: Volume 3 Issue 8, August 2014


Pages: 1999 - 2003



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Suchita S. Potdar, Dr. Mallikarjun, "Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 1999-2003, https://www.ijsr.net/getabstract.php?paperid=2015748, DOI: https://www.doi.org/10.21275/2015748



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 672 - 675

Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio

Shashank Dhananjaya, Yuvaraju B N

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 1563 - 1571

An Energy Aware Routing for Cognitive Radio Wireless Sensor Network using FuzzyQ

Vidya E V, Dr. B. S. Shylaja

Share this Article

Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022

Pages: 21 - 24

Minimax Algorithm and Alpha-Beta Pruning for Game Development Using Blockchain

Sumit S Shevtekar, Rutuja Kulkarni

Share this Article

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1579 - 1582

MANET, Security Attacks and Routing Protocol: A Survey

Navanpreet Kaur, Harjit Singh

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1346 - 1350

Energy Aware Routing in Next Generation Wireless Networks Using Efficient Resource Allocation

Gajanan Heddure, S. P. Pingat

Share this Article



Top