|
|
Mitigation of Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks using Trust Based Cooperative Sensing
|
|
|
|
|
نویسنده
|
mergu k. ,khan h.
|
منبع
|
international journal of engineering - 2021 - دوره : 34 - شماره : 6 - صفحه:1468 -1474
|
چکیده
|
One of most emerging technology in recent years in the field of wireless communication is the cognitive radio (cr) technology, which reduces spectrum scarcity significantly. the main function of cr technology is detecting spectrum holes or unused spectrum of primary users (pus), also called as licensed users, and assigning this unused spectrum to the secondary users (sus), also called unlicensed users. as the cr technology is open to every user, there are many security issues such as primary user emulsion attack (puea), jamming attack, spectrum sensing data falsification (ssdf) attack, lion attack, and sink hole attack and so on. ssdf attack is the one of major security attack in cognitive radio in which a malicious user sends false data intentionally to the other secondary users. the main aim of the ssdf attack is to disturb the communication between the secondary users or to gain more channel resources. one of the solutions to mitigating ssdf attack is the cooperative spectrum sensing. in this paper, we propose a new algorithm of cooperative sensing based on trust values of secondary users, and compares with the conventional cooperative spectrum sensing with the proposed algorithm. in this algorithm, firstly the cr which is waiting for the channel allocation sense the information and compare the sensing information of other crs. if any cr’s sensing report not matches with the test cr’s sensing with in the cluster, it will punish that cr otherwise it will give the reward. this procedure will be repeated for number of cycles. finally test cr calculates the trust value. based on the trust value fusion center will take the decision to include or exclude the trusting value of particular cr. the simulation of cooperative sensing also performed in both time variant channel and time invariant (rayleigh) channel. the authors also compare the three basic hard fusion techniques such as and, or, majority rule.
|
کلیدواژه
|
Cognitive Radio ,Security Attacks ,Spectrum Sensing Data Falsification ,Cooperative Spectrum Sensing Primary User ,Secondary User
|
آدرس
|
sri satya sai university of technology and medical sciences, department of electronics and communication engineering, India, k. l. deemed to be university, department of electronics and communication engineering, India
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Authors
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|