Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/480868
Title: | Studies on trust oriented machine Learning based mitigating schemes For ssdf attack in cognitive radio Networks |
Researcher: | Tephillah, S |
Guide(s): | Martin leo manickam, J |
Keywords: | Engineering and Technology Engineering Engineering Electrical and Electronic cognitive radio Networks ssdf attack mitigating schemes |
University: | Anna University |
Completed Date: | 2022 |
Abstract: | Spectrum scarcity limits the fulfillment of demand for the proliferation in wireless services. Cognitive Radio Network (CRN) deploys its intelligence in solving the issue of spectrum scarcity. The CRN enables the unlicensed users (secondary users -SU) to utilize the licensed user s spectrum without causing interference when their spectrum is idle. The CRN autonomously detects the white spaces in the spectrum and allocates the free spectrum to the SU s by its functionalities such as Spectrum Sensing, Spectrum analysis, Spectrum mobility and sharing. The ability to reconfigure its parameters according to the user s necessity by lively monitoring the environment proves the intelligence of the CRN. Several SU s employ Cooperative Spectrum Sensing (CSS), by sharing their spectrum sensing results to cooperatively detect the presence of the Primary User (PU) Signal. Also CSS takes the advantage of overcoming the deterioration of detection of PU signal by fading and shadowing. newlineSecuring the CRN becomes a prime factor due to the wireless and reconfigurability nature of the CRN. Also the complete functionality of CRN depends on the spectrum sensing results, consequently any threat affecting the sensing reports would obliterate the system. Spectrum Sensing Data Falsification attack (SSDF) is the threat that affects the spectrum sensing results of the CRN, with the objective to maliciously grab the spectrum or to selfishly occupy the spectrum there by exempting genuine SU s from using the spectrum. Mitigating SSDF attack requires a cognitive approach as different types of attackers can cause this attack. newline |
Pagination: | xv,113p. |
URI: | http://hdl.handle.net/10603/480868 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 314.51 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 3.18 MB | Adobe PDF | View/Open | |
03_content.pdf | 338.05 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 328.6 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 589.29 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 526.57 kB | Adobe PDF | View/Open | |
07_chapter3 .pdf | 804.04 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.23 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 808.8 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 191.6 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 681.24 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: