Detection and Prevention of a Selfish attack in Cognitive Radio Adhoc Network

Journal Title: Scholars Journal of Engineering and Technology - Year 2014, Vol 2, Issue 3

Abstract

Cognitive radio network (CRN) is a network in which an un-licensed user is secondary user (SU) can use an empty channel in a spectrum band of licensed user known as primary user (PU). It is useful as well as harmful too. Because of this some selfish secondary user can use this empty channel through selfish attacks. In this paper we focus on selfish attack in cognitive radio (CR) adhoc network where selfish SU will occupy all or part of resources of multiple channels prohibiting other SU from accessingthe empty channels. Here an attempt is made to detect the selfish node and prevent the selfish attack in CR adhoc network. Keywords: Cognitive radio networks, Primary user, Secondary user, selfish attack, target node.

Authors and Affiliations

Pavan H M, K Vijaya

Keywords

Related Articles

Empirical Study on the Main Physical Items of Nano Oil in an Isolated Vertical Pipe

Finding the properties of crude oil after addition of nano particle is considered in this work. Results are shown in Figures indicate on the positive effect of nano particles in the oil sweetening processes. The amount o...

Exploration of Blended Learning Model Based on Moodle Art Learning Platform-Taking "Photography Foundation" Course for Example

In this paper, we combined with face-to-face teaching and online learning supported by the Moodle art learning platform from the concept of blended learning, and constructed a blended learning model based on Moodle platf...

Design and Implementation of A Knowledge-Based Typhoid Fever Diagnosis Expert Advisor Using Forward Chaining Inference Mechanism

Abstract:The medical field is experiencing setbacks, medical cases almost always seems to outnumber the number of medical experts required to attend to them. This in part is due to lack of qualified doctors to handle spe...

Improvement of EIGRP Protocol Routing Algorithm with the Consideration of Information Security Risk Parameters

In this paper it’s proposed to use the parameter of information security risk in the formula of EIGRP protocol metric calculation to route the traffic by the most secure paths in the network. The method proposes to calcu...

Data Mining in the Application of Criminal Cases Based on Decision Tree

A briefing on data mining technology used in criminal investigation work and the importance of using ID3 decision tree to structure the Decision Tree algorithm method is given by this paper. It makes a combination of cri...

Download PDF file
  • EP ID EP384399
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

Pavan H M, K Vijaya (2014). Detection and Prevention of a Selfish attack in Cognitive Radio Adhoc Network. Scholars Journal of Engineering and Technology, 2(3), 373-376. https://europub.co.uk/articles/-A-384399