Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Improvement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks

Print
PDF
IJCA Proceedings on National Conference on Advances in Computing, Communication and Networking
© 2016 by IJCA Journal
ACCNET 2016 - Number 3
Year of Publication: 2016
Authors:
Adnaan Ahmad
Vijay Joshi

Adnaan Ahmad and Vijay Joshi. Article: Improvement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks. IJCA Proceedings on National Conference on Advances in Computing, Communication and Networking ACCNET 2016(3):1-4, June 2016. Full text available. BibTeX

@article{key:article,
	author = {Adnaan Ahmad and Vijay Joshi},
	title = {Article: Improvement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks},
	journal = {IJCA Proceedings on National Conference on Advances in Computing, Communication and Networking},
	year = {2016},
	volume = {ACCNET 2016},
	number = {3},
	pages = {1-4},
	month = {June},
	note = {Full text available}
}

Abstract

The traditional spectrum management techniques allow most of the spectrum to be used by licensed users exclusively. Spectrum sharing mechanism in Cognitive Radio Networks allows spectrum access to secondary user in addition to the primary licensed user. The Secondary Users, in order to compete for the spectrum, turn malicious and try to occupy all or a part of the available channel leading to Selfish Attacks. It results in a degradation of spectrum utilisation efficiency considerably. This paper presents a detection mechanism to counter the effect of selfish attack thereby aiming to improve the efficiency of spectrum utilization.

References

  • R. Chen, J. -M. Park, and J. H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE JSAC, vol. 26, no. 1, Jan. 2008, pp. 25–36.
  • C. H. Chin, J. G. Kim, and D. Lee, "Stability of Slotted Aloha with Self- ish Users under Delay Constraint," KSII Trans. Internet and Info. Sys- tems, vol. 5, no. 3, Mar. 2011, pp. 542–549.
  • M. Yan et al. , "Game-Theoretic Approach Against Selfish Attacks in Cognitive Radio Networks," IEEE/ACIS 10th Int'l. Conf. Computer and Information Science (ICIS), May 2011, pp. 58–61.
  • K. Cheng Howa, M. Maa, and Y. Qin, "An Altruistic Differentiated Ser- vice Protocol in Dynamic Cognitive Radio Networks Against Sel?sh Behaviors," Computer Networks, vol. 56, no. 7, 2012, pp. 2068–79.
  • Jo, Minho, et al. "Selfish attacks and detection in cognitive radio ad-hoc networks. " Network, IEEE 27. 3 (2015): 46-50.