Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/321238
Title: Developing Security Techniques in Cognitive Networks
Researcher: Saini, Natasha
Guide(s): Pandey, Nitin and Singh, Ajeet Pal
Keywords: Computer Science
Computer Science Hardware and Architecture
Computer security
Engineering and Technology
Network computers
University: Amity University, Noida
Completed Date: 2019
Abstract: Cognitive radios can be considered as smart gadgets that can gain from the newlineexperience and progressively adjust to the highlights of the earth. Significant research newlineendeavors have been given towards the investigation and advancement of learning and newlinethinking methods without considering security related issues in detail. newlineHigh security level is ensured in CRN by selecting GH based on TAHS scheme with newlinethe involvement of major entity namely SA. In each group, spectrum sensing is newlineperformed by ETED method which improves spectrum sensing in order to enhance newlinePUE detection. PUE attack is detected using SSLE scheme which estimates signal newlinesource location based on Received Signal Strength (RSS). FC maintains CNN to detect newlineSSDF attack. Here each SUs report is compared with SA s sensing report to find newlinemalicious activity of SUs.SSDF mitigation is taken over by isolating malicious SU from newlinethe network. This isolation decision is made by predicting future activity of SU using newlinetri-state MCM method. Unauthorized SUs is detected and blocked initially by CAHC algorithm. Intellectual jamming attack prevention scheme in which malevolent or malicious SU is compromised to act as supporter node is presented. Supporter node is provided with optimal channel selected by HCS-FFA algorithm. The simulator that has been used is installed on Ubuntu operating system that is NS3.Performance metrics that are considered are predication of miss detection, prediction of detection, prediction of attack strength, through put and approximation of honest nodes. Significant parameters that are considered in implementation of malevolent node based protection system research demonstrating provision of we evaluate our proposed malevolent node based protection system with other existing works MIMO strategy honeypot method , and reputation method in terms of metrics based upon performance which includes packet delivery ratio (PDR), delay, secrecy rate, SINR, and probability of false alarm. newline newline
Pagination: 
URI: http://hdl.handle.net/10603/321238
Appears in Departments:Amity Institute of Information Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File21.11 kBAdobe PDFView/Open
02_certificate.pdf261.99 kBAdobe PDFView/Open
03_preliminary pages.pdf581.26 kBAdobe PDFView/Open
04_chapter 1.pdf335.75 kBAdobe PDFView/Open
05_chapter 2.pdf539.56 kBAdobe PDFView/Open
06_chapter 3.pdf498.89 kBAdobe PDFView/Open
07_chapter 4.pdf754.98 kBAdobe PDFView/Open
08_chapter 5.pdf1.12 MBAdobe PDFView/Open
09_chapter 6.pdf560.87 kBAdobe PDFView/Open
10_chapter 7.pdf275 kBAdobe PDFView/Open
11_references.pdf446.26 kBAdobe PDFView/Open
80_recommendation.pdf289.31 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: