Downloads: 123 | Views: 307
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.2 / 10
Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory
Suchita S. Potdar, Dr. Mallikarjun
Abstract: Cognitive radio is an opportunistic communication technology designed to help unlicensed users to utilize the maximum available licensed bandwidth. Cognitive radio has recently attracted a lot of research interest. However, little research has been done regarding security in cognitive radio, while much more work has been done on spectrum sensing and allocation problems. A selfish cognitive radio node can occupy all or part of the resources of multiple channels, prohibiting other cognitive radio nodes from accessing these resources. Selfish cognitive radio attacks deals with serious security problem like fake signal attack, Channel pre-occupation attack. These security problems they significantly degrade the performance of a cognitive radio network. In this proposal we identify the types of selfish attacks in cognitive radio ad-hoc networks and propose an easy and efficient selfish cognitive radio attack detection technique using Markov chain model and Game Theory. This technique is simple and reliable and can be well fitted for practical work in future work.
Keywords: Cognitive Radio, Markov Chain, Game Theory
Edition: Volume 3 Issue 8, August 2014
Pages: 1999 - 2003
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 672 - 675Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio
Shashank Dhananjaya, Yuvaraju B N
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 1563 - 1571An Energy Aware Routing for Cognitive Radio Wireless Sensor Network using FuzzyQ
Vidya E V, Dr. B. S. Shylaja
Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022
Pages: 21 - 24Minimax Algorithm and Alpha-Beta Pruning for Game Development Using Blockchain
Sumit S Shevtekar, Rutuja Kulkarni
Downloads: 110
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1579 - 1582MANET, Security Attacks and Routing Protocol: A Survey
Navanpreet Kaur, Harjit Singh
Downloads: 111
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1346 - 1350Energy Aware Routing in Next Generation Wireless Networks Using Efficient Resource Allocation
Gajanan Heddure, S. P. Pingat