Malicious User Detection in Cooperative Environment in Cognitive Radio Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 426

Research Paper | Electronics & Communication Engineering | India | Volume 2 Issue 3, March 2013 | Popularity: 6.6 / 10


     

Malicious User Detection in Cooperative Environment in Cognitive Radio Networks

Sripriya. N, Geetha Ramani. J


Abstract: Cognitive radio efficiently utilizes the unused spectrum for secondary usage without interfering a primary licensed user. In cooperative environment, a primary licensed user can share spectrum occupancy information with a secondary user to enable dynamic spectrum access. However, a secondary user needs to verify accuracy of the spectrum occupancy information and it comes the legitimate primary users. Without the verification, a malicious user can falsify the spectrum occupancy information. This can result interference to the primary users and minimize available spectrum for the secondary usage. Proposed technique verifies that the source of the spectrum occupancy information is from the legitimate primary user thereby maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.


Keywords: Cognitive Radio, Primary User, Secondary User, Cooperative Spectrum Sensing, Security


Edition: Volume 2 Issue 3, March 2013


Pages: 71 - 74



Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Sripriya. N, Geetha Ramani. J, "Malicious User Detection in Cooperative Environment in Cognitive Radio Networks", International Journal of Science and Research (IJSR), Volume 2 Issue 3, March 2013, pp. 71-74, https://www.ijsr.net/getabstract.php?paperid=IJSRON2013526, DOI: https://www.doi.org/10.21275/IJSRON2013526

Top