Attacks & Preventions of Cognitive Radio Network-A Survey
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
In this paper we analyze and surveyed a latest communication technology named “Cognitive Radio Network”. Cognitive radio network is a network in which an un-licensed user can use an empty channel in a spectrum band of licensed user. It is useful as well as harmful too. Because of this some unwanted user can use this empty channel through attacks and threats. In this paper we focus on cognitive radio network attacks and how to prevent our network through these attacks.
Authors and Affiliations
Dr. Anubhuti Khare , Manish Saxena , ,Roshan Singh Thakur , Khyati Chourasia
Design and implementation of low power 16 bit ALU with clock gating
The ALU is one of the most frequently accessed modules in a CPU and is utilized during most instruction executions. Hence the power consumption of the ALU is a major concern.In this paper a low power 16 bit ALU is...
A Review on Energy Efficient Modulation and Coding Techniques for Clustered Wireless Sensor Networks
A standard wireless sensor network comprises of a huge number of sensor nodes with data processing and communication capabilities. The sensor nodes pass the gathered data using radio transmitter, to a sink either...
Image Edge Detection: A Review
Edge detection is important part of image processing for object detection. So it becomes extremely important to have a good understanding of edge detection algorithms. An edge is the real or imagined line that marks t...
WEB PAGE CATEGORIZATION USING WEB MINING
The primary goal of the web site is to provide the relevant information to the users. Web mining technique is used to categorize users and pages by analyzing users behavior, the content of pages and order of URLs...
Color Image Segmentationusing Clustering Technique
This work presents image segmentation technique based on colour features with K-means clustering algorithm. In this we did not used any training data. In this paper, we present a simple and efficient implementation...