Adnaan Ahmad and Vijay Joshi. Article: Improvement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks. IJCA Proceedings on National Conference on Advances in Computing, Communication and Networking ACCNET 2016(3):1-4, June 2016. Full text available. BibTeX
@article{key:article, author = {Adnaan Ahmad and Vijay Joshi}, title = {Article: Improvement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks}, journal = {IJCA Proceedings on National Conference on Advances in Computing, Communication and Networking}, year = {2016}, volume = {ACCNET 2016}, number = {3}, pages = {1-4}, month = {June}, note = {Full text available} }
Abstract
The traditional spectrum management techniques allow most of the spectrum to be used by licensed users exclusively. Spectrum sharing mechanism in Cognitive Radio Networks allows spectrum access to secondary user in addition to the primary licensed user. The Secondary Users, in order to compete for the spectrum, turn malicious and try to occupy all or a part of the available channel leading to Selfish Attacks. It results in a degradation of spectrum utilisation efficiency considerably. This paper presents a detection mechanism to counter the effect of selfish attack thereby aiming to improve the efficiency of spectrum utilization.
References
- R. Chen, J. -M. Park, and J. H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE JSAC, vol. 26, no. 1, Jan. 2008, pp. 25–36.
- C. H. Chin, J. G. Kim, and D. Lee, "Stability of Slotted Aloha with Self- ish Users under Delay Constraint," KSII Trans. Internet and Info. Sys- tems, vol. 5, no. 3, Mar. 2011, pp. 542–549.
- M. Yan et al. , "Game-Theoretic Approach Against Selfish Attacks in Cognitive Radio Networks," IEEE/ACIS 10th Int'l. Conf. Computer and Information Science (ICIS), May 2011, pp. 58–61.
- K. Cheng Howa, M. Maa, and Y. Qin, "An Altruistic Differentiated Ser- vice Protocol in Dynamic Cognitive Radio Networks Against Sel?sh Behaviors," Computer Networks, vol. 56, no. 7, 2012, pp. 2068–79.
- Jo, Minho, et al. "Selfish attacks and detection in cognitive radio ad-hoc networks. " Network, IEEE 27. 3 (2015): 46-50.