Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/342274
Title: Investigations on strategies to mitigate primary user emulation attack in cognitive radio networks
Researcher: Arun S
Guide(s): Umamaheswari G
Keywords: 
Cognitive Radio Network
Ad hoc network
University: Anna University
Completed Date: 2020
Abstract: Cognitive Radio Network CRN is a type of ad hoc network that relies on radio resources for establishing communication between different types of users The network consists of licensed or Primary Users PUs and un licensed or Secondary Users SUs between which the communication is established The primary users possess a varying and dynamic band of frequency called spectrum which it shares with the SU on request If the licensed user is free then it allocates the available spectrum for SU utilization After spectrum utilization PU revokes the allocated spectrum from the SU limits This method of communication is adapted widely in any wireless device equipped with a wireless transmitter and receiver that requires information exchange The SU primary performs spectrum sensing for identifying appropriate communication channels for initiating transmission By assessing the channel conditions and its current state it selects a suitable channel for communication Channel capacity traffic density congestion interference and transmission loss are some of the factors that are assessed by the SU for selecting a reliable channel The Cognitive Radio CR paradigm is designed to address the existing issues in spectrum demand and mobile communication using dynamic spectrum access and management to assign dynamic spectrum channels for meeting the demands of SU As CRNs are a sub class of ad-hoc networks it inherits both the advantageous and deficient features of the network that is experienced in user level communications For the successful CRN implementation the issues in the physical layer MAC layer routing and other security threats are needed to be considered The network is open to any varying density of users with scalable and decentralized collaboration The communications and the transmission principles are designed by the PU wherein the channel allocation and spectrum sensing abilities are modelled for the SUs As the network is decentralized and lacks integrity security deficiency is considered as a major flaw which degrades co
Pagination: xx,121p.
URI: http://hdl.handle.net/10603/342274
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File177.13 kBAdobe PDFView/Open
02_certificates.pdf940.99 kBAdobe PDFView/Open
03_vivaproceedings.pdf1.54 MBAdobe PDFView/Open
04_bonafidecertificate.pdf1.13 MBAdobe PDFView/Open
05_abstracts.pdf182.24 kBAdobe PDFView/Open
06_acknowledgements.pdf1.32 MBAdobe PDFView/Open
07_contents.pdf552.67 kBAdobe PDFView/Open
08_listoftables.pdf165.98 kBAdobe PDFView/Open
09_listoffigures.pdf181.26 kBAdobe PDFView/Open
10_listofabbreviations.pdf238.68 kBAdobe PDFView/Open
11_chapter1.pdf1.1 MBAdobe PDFView/Open
12_chapter2.pdf418.69 kBAdobe PDFView/Open
13_chapter3.pdf1.22 MBAdobe PDFView/Open
14_chapter4.pdf1.2 MBAdobe PDFView/Open
15_chapter5.pdf958.56 kBAdobe PDFView/Open
16_conclusion.pdf331.86 kBAdobe PDFView/Open
17_references.pdf1.29 MBAdobe PDFView/Open
18_listofpublications.pdf283.66 kBAdobe PDFView/Open
80_recommendation.pdf162.66 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: