Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/342274
Title: | Investigations on strategies to mitigate primary user emulation attack in cognitive radio networks |
Researcher: | Arun S |
Guide(s): | Umamaheswari G |
Keywords: | Cognitive Radio Network Ad hoc network |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Cognitive Radio Network CRN is a type of ad hoc network that relies on radio resources for establishing communication between different types of users The network consists of licensed or Primary Users PUs and un licensed or Secondary Users SUs between which the communication is established The primary users possess a varying and dynamic band of frequency called spectrum which it shares with the SU on request If the licensed user is free then it allocates the available spectrum for SU utilization After spectrum utilization PU revokes the allocated spectrum from the SU limits This method of communication is adapted widely in any wireless device equipped with a wireless transmitter and receiver that requires information exchange The SU primary performs spectrum sensing for identifying appropriate communication channels for initiating transmission By assessing the channel conditions and its current state it selects a suitable channel for communication Channel capacity traffic density congestion interference and transmission loss are some of the factors that are assessed by the SU for selecting a reliable channel The Cognitive Radio CR paradigm is designed to address the existing issues in spectrum demand and mobile communication using dynamic spectrum access and management to assign dynamic spectrum channels for meeting the demands of SU As CRNs are a sub class of ad-hoc networks it inherits both the advantageous and deficient features of the network that is experienced in user level communications For the successful CRN implementation the issues in the physical layer MAC layer routing and other security threats are needed to be considered The network is open to any varying density of users with scalable and decentralized collaboration The communications and the transmission principles are designed by the PU wherein the channel allocation and spectrum sensing abilities are modelled for the SUs As the network is decentralized and lacks integrity security deficiency is considered as a major flaw which degrades co |
Pagination: | xx,121p. |
URI: | http://hdl.handle.net/10603/342274 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 177.13 kB | Adobe PDF | View/Open |
02_certificates.pdf | 940.99 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 1.54 MB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 1.13 MB | Adobe PDF | View/Open | |
05_abstracts.pdf | 182.24 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 1.32 MB | Adobe PDF | View/Open | |
07_contents.pdf | 552.67 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 165.98 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 181.26 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 238.68 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 1.1 MB | Adobe PDF | View/Open | |
12_chapter2.pdf | 418.69 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 1.22 MB | Adobe PDF | View/Open | |
14_chapter4.pdf | 1.2 MB | Adobe PDF | View/Open | |
15_chapter5.pdf | 958.56 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 331.86 kB | Adobe PDF | View/Open | |
17_references.pdf | 1.29 MB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 283.66 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 162.66 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: