亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Detecting And Mitigating Selfish Secondary Users In Cognitive Radio

认知无线电 计算机科学 频谱管理 仿真 计算机网络 节点(物理) 无线 无线电频谱 认证(法律) 计算机安全 空白 电信 工程类 结构工程 经济 经济增长
作者
Swetha Thennavan,Thenmozhi Karuppasamy,Prem Savarinathan,Avila Jayapalan
标识
DOI:10.1109/iccci56745.2023.10128483
摘要

In this technology world due to the rapid growth of wireless techniques there leads to the shortage of spectrum. Dynamic spectrum access tends to be the suitable solution to overcome the spectrum scarcity issue and this is achieved through cognitive radio. Searching for the free spectrum or spectrum holes is the major job of any cognitive radio. This is known as spectrum sensing. Once the spectrum hole is available the cognitive radio can transmit the information to its intended receiver utilizing the free spectrum. In the cognitive radio environment, there are some malicious users also known as selfish users. This malicious user wishes to access the spectrum on its own and thus cause blockage to the cognitive users also called as secondary users from accessing the spectrum. This attack is known as Primary User Emulation Attack(PUEA) and it is considered as one of the important attacks in the physical layer of the cognitive radio. Primary user emulation attack leads to inefficient dynamic spectrum access by the cognitive radio. Hence this chapter focuses on mitigating primary user emulation attack (PUEA) effectively through authentication tag. Threat free environment paves way to utilize the spectrum holes in an efficient manner. The information about the spectrum holes is accepted by the cognitive radio only if it is appended with the authentication tag. The information about the usage of the spectrum and the authentication tag is sent to the cognitive radio by a third party who has a good relationship with cognitive radio. It is a trusty worthy node. The trust worthy node may get some benefit or may not get any benefit from the cognitive radio in future. It is assumed that still the trustworthy node is ready to help the cognitive radio. The authentication tag helps the cognitive radio in making a correction decision to occupy the spectrum. The strength of the authentication tag decides the robustness of the scheme. To enhance the robustness of the tag generated, a double layer authentication tag generation method has been proposed. Initially Sanskrit sutra named YRBS has been used to generate the seed value for Hash function. The output obtained using Hash algorithm is now fed as input to Rijndael algorithm. After several rounds of processing and permutations the double layered authentication tag is generated. By doing so the randomness of the tag has been improved when compared to the single stage. Higher the randomness of the tag generated greater is the time it can withstand Brute force attack. The tag so generated is combined with the spectrum free information and transmitted by the trust worthy node. Only the intended cognitive radio can decode the data. The other cognitive radio including the malicious node can receiver the information. But they cannot decode the data because the key to decode the data is known only to the trustworthy node and the intended cognitive radio. It is assumed that the key has been already exchanged between them in a secure manner. In this way the primary user emulation attack is mitigated. NIST statistical test suite is one of the important test suite to prove the randomness of the tag. Hence in this chapter to prove the randomness of the authentication tag it is validated through NIST test.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
5秒前
科研通AI2S应助倪妮采纳,获得10
19秒前
科研通AI2S应助倪妮采纳,获得10
19秒前
赘婿应助倪妮采纳,获得10
19秒前
wanci应助倪妮采纳,获得10
19秒前
无花果应助Dralee采纳,获得10
21秒前
29秒前
44秒前
44秒前
路卡利欧完成签到 ,获得积分10
48秒前
光亮的垣完成签到 ,获得积分10
1分钟前
1分钟前
1分钟前
丘比特应助movoandy采纳,获得10
1分钟前
1分钟前
automan发布了新的文献求助10
1分钟前
roe完成签到 ,获得积分20
1分钟前
1分钟前
automan完成签到,获得积分10
1分钟前
胖小羊完成签到 ,获得积分10
1分钟前
1分钟前
忧郁小鸽子完成签到,获得积分10
1分钟前
小刘完成签到,获得积分10
1分钟前
2分钟前
玛卡巴卡爱吃饭完成签到 ,获得积分10
2分钟前
冷静新烟完成签到,获得积分20
2分钟前
冷静新烟发布了新的文献求助10
2分钟前
lalala完成签到,获得积分10
2分钟前
Kevin完成签到,获得积分10
2分钟前
FMHChan完成签到,获得积分10
2分钟前
zzz完成签到,获得积分10
3分钟前
量子星尘发布了新的文献求助10
3分钟前
3分钟前
倪妮发布了新的文献求助10
3分钟前
倪妮发布了新的文献求助10
3分钟前
倪妮发布了新的文献求助10
4分钟前
zxcvvbb1001完成签到 ,获得积分10
4分钟前
倪妮发布了新的文献求助30
4分钟前
4分钟前
热情的橙汁完成签到,获得积分10
4分钟前
高分求助中
Comprehensive Toxicology Fourth Edition 2026 10000
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Target genes for RNAi in pest control: A comprehensive overview 600
Master Curve-Auswertungen und Untersuchung des Größeneffekts für C(T)-Proben - aktuelle Erkenntnisse zur Untersuchung des Master Curve Konzepts für ferritisches Gusseisen mit Kugelgraphit bei dynamischer Beanspruchung (Projekt MCGUSS) 500
Design and Development of A CMOS Integrated Multimodal Sensor System with Carbon Nano-electrodes for Biosensor Applications 500
A novel angiographic index for predicting the efficacy of drug-coated balloons in small vessels 500
Textbook of Neonatal Resuscitation ® 500
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 内科学 生物化学 物理 计算机科学 纳米技术 遗传学 基因 复合材料 化学工程 物理化学 病理 催化作用 免疫学 量子力学
热门帖子
关注 科研通微信公众号,转发送积分 5104996
求助须知:如何正确求助?哪些是违规求助? 4315064
关于积分的说明 13443981
捐赠科研通 4143505
什么是DOI,文献DOI怎么找? 2270465
邀请新用户注册赠送积分活动 1272960
关于科研通互助平台的介绍 1210012