Please use this identifier to cite or link to this item:
Title: A Novel and secure two layer approach to mitigate primary user emulation attack in cognitive radio networks
University: Vignans Foundation for Science Technology and Research
Completed Date: 2018
Abstract: The radio spectrum is a sparse, vital and an incredibly valuable resource. Owing to rigid and accredited spectrum allotment the spectrum band is unoccupied for a significant quantity of time. Cognitive Radio is envisaged as wireless and smart know-how to make skillful use of spectrum. Electromagnetic waves that are readily susceptible to attacks are used as a propagation medium, and this causes safety a significant apprehension in Cognitive Radio. Also, being a lithe wireless set-up, it is vulnerable towards conventional menace as well as exclusive attacks having unfavorable consequences on its performance. Cognitive technology is defenseless to many sort of threats which include be licensed/primary user emulation, data falsification, self-centered channel and control channel compromise and many more. Once the system is attacked, the essential characteristic features of cognitive radio are deteriorated, in addition to the system behaving fitfully. newlineIn licensed user emulation assault, assailant imitates signals of an authorized user and wedges the spectrum such that service is denied to all the legitimate unlicensed users. In a cognitive milieu, a channel is at the dispense of a secondary/unlicensed client for communication till the primary user reverts. This guarantees the protection of the legacy rights of the licensed users and the channel bandwidth is relegated to other unlicensed users when there is no incumbent communication. The brunt of this attack is huge, and perturbs the whole communication process and largely the high priority communications. newlineIn the present research, a chaotic communication based approach is explored. A test signal is sent over a band, and one can hint the possession of the band, i.e., whether it is engaged or not. Furthermore, in the projected approach, a mechanism based on trust is suggested for detection and tracing the cause of licensed user emulation assault.The assailant nodes once recognized in the system, are wedged from the network communication process.
Pagination: 157
Appears in Departments:Department of Electronics and Communication Engineering

Files in This Item:
File Description SizeFormat 
10_chapter-7.pdfAttached File25.68 kBAdobe PDFView/Open
11_references.pdf337.31 kBAdobe PDFView/Open
12_ appendix.pdf604.01 kBAdobe PDFView/Open
13_publications.pdf134.82 kBAdobe PDFView/Open
1_title.pdf126.76 kBAdobe PDFView/Open
2_ certificate.pdf121.15 kBAdobe PDFView/Open
3_preliminary pages.pdf187.98 kBAdobe PDFView/Open
4_chapter-1.pdf727.86 kBAdobe PDFView/Open
5_chapter-2.pdf187.1 kBAdobe PDFView/Open
6_-chapter-3.pdf380.27 kBAdobe PDFView/Open
7_chapter-4.pdf412.25 kBAdobe PDFView/Open
8_chapter-5.pdf811.25 kBAdobe PDFView/Open
9_chapter-6.pdf434.91 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: