The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: This paper considers combatting the jamming and selfish attacks in Cognitive Radio (CR) networks operating at the white (unused) and grey (underused) spaces in the RF spectrum. CR facilitates effective utilization of RF spectrum resources but still vulnerable to various network attacks. Methods/Statistical Analysis: This study considered the jamming and selfish type of attack detection and to defend against them because of its severity. An Intrusion Detection System (IDS) is formed to combat the against jamming and selfish type of attacks in CR. Findings: In this system cumulative-sum algorithm is used, which incorpates the control centre information over the channel. The cumulative-sum based algorithm shows improved performance in provisioning better packet delivery ratio, throughput and minimum energy and packet drop. Further, this algorithms works better for more number of Secondary Users (SU), and the Unlicensed Users. Applications/Improvements: This work can be enhanced further by simulating under various network attacks and in the presence of numerous SU.

Keywords

Cognitive Radio, Jamming Attacks, Network Security,Selfish Attacks, Secure Spectrum Sensing
User