A Novel System Modeling for Investigating Security Challenges in Cognitive Radio Networks
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 4
Abstract
As wireless communication increases day by day the available spectrum becomes scarcer as the demand for spectrum usage increasing day by day for all wireless applications. The major cause is significant amount of the spectrum leads to underutilization. To mitigate this problem effective utilization of spectrum is must. For this Cognitive Radio (CR) was introduced. Cognitive Radio enables secondary users to sense which portions of the spectrum are available, select best available channel, coordinate spectrum access with other users and vacate the channel when a primary user reappears for spectrum usage rights. If the spectrum is utilizing by malicious user instead of secondary user it is primary user emulsion attack (PUEA). So that the problem of spectrum misuse arises. We proposed a novel system with maximum likelihood criterion to mitigate the problem of spectrum misuse. Maximum Likelihood based analysis to detect PUEA in fading wireless channels in the presence of multiple randomly located malicious users. We show that the proposed model can achieve a probability of successful PUEA less than that obtained by existing model with Neyman-Pearson criterion.
Authors and Affiliations
Vani Macharla*
Static Analysis for Malicious Codes Study
Computer viruses are big threat to computer world, researchers doing work in this area have made various efforts in the direction of classification and detection methods of these viruses. Graph mining and system c...
The Midrex Process and the Nigerian Steel Industry
The goal of producing steel in Nigeria from iron ore was made possible through the Midrex Process based Direct Reduction plant at the Delta Steel Company. The iron ore was originally imported from Liberia and its...
[b]AN INSPECTION ON OFFLINE SIGNATURE AUTHENTICATION [/b][b][/b]
In the era of emergent technology, security is that the foremost anxiety to avoid replicas and counterfeits. There are diverse Biometric systems that enable in personal identification, amongst those verification s...
Analysis on Topology of DVR Used in Low-voltage Distribution Grid
Dynamic voltage restorer (DVR) is a series-connected transient voltage compensation equipment used in distribution grid aiming at dynamic power quality problems such as voltage sag and swell. The topology of DVR...
IDENTIFICATION OF ATTACKERS BY USING SECURITY SERVICES OF HONEYPOT
Internet security is vital issue recently. it is necessary to protect our assets or valuable data from unauthorized person. There are number of techniques are available, one of them is honeypot. Honeypots are mode...