CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Improvement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks

Published on June 2016 by Adnaan Ahmad, Vijay Joshi
National Conference on Advances in Computing, Communication and Networking
Foundation of Computer Science USA
ACCNET2016 - Number 3
June 2016
Authors: Adnaan Ahmad, Vijay Joshi
a45b3474-ea49-4e37-a019-0908a3ef3b6f

Adnaan Ahmad, Vijay Joshi . Improvement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks. National Conference on Advances in Computing, Communication and Networking. ACCNET2016, 3 (June 2016), 1-4.

@article{
author = { Adnaan Ahmad, Vijay Joshi },
title = { Improvement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks },
journal = { National Conference on Advances in Computing, Communication and Networking },
issue_date = { June 2016 },
volume = { ACCNET2016 },
number = { 3 },
month = { June },
year = { 2016 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/accnet2016/number3/24981-2270/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing, Communication and Networking
%A Adnaan Ahmad
%A Vijay Joshi
%T Improvement of Spectrum Utilisation in Cognitive Radio Networks by Detection of Selfish Attacks
%J National Conference on Advances in Computing, Communication and Networking
%@ 0975-8887
%V ACCNET2016
%N 3
%P 1-4
%D 2016
%I International Journal of Computer Applications
Abstract

The traditional spectrum management techniques allow most of the spectrum to be used by licensed users exclusively. Spectrum sharing mechanism in Cognitive Radio Networks allows spectrum access to secondary user in addition to the primary licensed user. The Secondary Users, in order to compete for the spectrum, turn malicious and try to occupy all or a part of the available channel leading to Selfish Attacks. It results in a degradation of spectrum utilisation efficiency considerably. This paper presents a detection mechanism to counter the effect of selfish attack thereby aiming to improve the efficiency of spectrum utilization.

References
  1. R. Chen, J. -M. Park, and J. H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE JSAC, vol. 26, no. 1, Jan. 2008, pp. 25–36.
  2. C. H. Chin, J. G. Kim, and D. Lee, "Stability of Slotted Aloha with Self- ish Users under Delay Constraint," KSII Trans. Internet and Info. Sys- tems, vol. 5, no. 3, Mar. 2011, pp. 542–549.
  3. M. Yan et al. , "Game-Theoretic Approach Against Selfish Attacks in Cognitive Radio Networks," IEEE/ACIS 10th Int'l. Conf. Computer and Information Science (ICIS), May 2011, pp. 58–61.
  4. K. Cheng Howa, M. Maa, and Y. Qin, "An Altruistic Differentiated Ser- vice Protocol in Dynamic Cognitive Radio Networks Against Sel?sh Behaviors," Computer Networks, vol. 56, no. 7, 2012, pp. 2068–79.
  5. Jo, Minho, et al. "Selfish attacks and detection in cognitive radio ad-hoc networks. " Network, IEEE 27. 3 (2015): 46-50.
Index Terms

Computer Science
Information Sciences

Keywords

Cognitive Radio Networks Spectrum Utilisation Selfish Attacks Spectrum Sharing Spectrum Sensing