DOI QR코드

DOI QR Code

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR. (Department of MCA, BMSITM, VTU-RC, MCA Dept. BMSIT&M) ;
  • Arun, kumar B.R (Department of Computer Science & Engineering, VTU-RC, Dept. of MCA, BMSIT&M)
  • Received : 2021.05.05
  • Published : 2021.05.30

Abstract

The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Keywords

References

  1. Yenumula B Reddy, "Security Issues and threats in Cognitive Radio Networks", The Ninth Advanced international conference on Telecommunications, AICT 2013.
  2. Kamal Kumar Chauchan, Amit Kumar Singh Sangar, "Survey of Security Threats and attacks in Cognitive Radio Networks".
  3. B. Sarala, S Rukmani Devi,M Suganty,S Jhansi Ida", A novel Authentication Mechanism for Cognitive Radio Network", International Journal of Recent Technologies Engineering (IJRTE), vol-8 Issue 4, November 2019.
  4. T. Lakshmi Bai, Dr Parthasarthy "Encryption Algorithm for Defending PUE Attack in Cognitive Radio" International Journal of Applied Engineering Research vol12, November 2019.
  5. Hysung Kin, Em Kying Ryu, "Delegation Based User Authentication Framework over Cognitive Radio Network", 2 December 2017.
  6. A.G. Fragkiadakir, E.Z .Tragos and I.G Askoxylakis, "A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks,"IEEE Communications surveys and Tutorials, 2013,vol 15, Issue 1,PP 428-455. https://doi.org/10.1109/SURV.2011.122211.00162
  7. T. Charles Clancy, Nathan Goergen, "Security in Cognitive Radio Networks Threats and Mitigation.
  8. G, Jakimoski and K.P. Subbalkshmi, "Denial-of-Service Attacks on dynamic Spectrum access Networks", IEEE Cognets workshop IEEE International Conference on Communications May 2008.
  9. Aliyu Abukakar "An Investigation of Performance Versus Security issues in Cognitive Radio Networks", International Journal of Scientific and Engineering Research, volume 7, Issue 9 September 2016.
  10. Kurose and Ross "Computer Networking-A Top-Down Approach Featuring the Internet".
  11. Henrique Moura, Alisson R Alves, Jonas R A Borges, Daniel F Macedo, Macros A M Vieira "Ethanol: A Software Defined Networking Architecture for IEEE802.11 Networks, July 2015.
  12. A.R. Alves, H.M. Durate, J.R.A. Borges, V.F.S.Mota, L.H. Cantelli, D.F. Macedo and M.A.M. Vieria, " HomeNetRescue: an Software Defined Network service for troubleshooting Home Networks", IEEE/IFPF Network optimization and Management Symposium, April 2018.
  13. H.D.Moura,G.V.C Bessa,M.A.M Vieria, D.F.Macedo "Ethanol: Software Defined Network for 802.11 wireless Network", IFPF/IEEE Symposium on Integrated Networks Management,pp 388-396,2015.
  14. H.D. Moura, D.Fernandes Macedo and M.A.M Vieria "Automatic Quality of experience management for wlan networks using multi-armed bandit",IFPF/IEEE Symposium on Integrated Networks Management pp 279-288, April 2019.
  15. J.C.T Guimares, H.D.Moura,J.R.Borges,M.A,Vieria, L.F.Vieria and D.F.Macedo "Dynamic Bandwidth Allocation for Home and Soho Wireless Networks" IEEE Symposium on Computers and Communications, 2018.