Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/480868
Title: Studies on trust oriented machine Learning based mitigating schemes For ssdf attack in cognitive radio Networks
Researcher: Tephillah, S
Guide(s): Martin leo manickam, J
Keywords: Engineering and Technology
Engineering
Engineering Electrical and Electronic
cognitive radio Networks
ssdf attack
mitigating schemes
University: Anna University
Completed Date: 2022
Abstract: Spectrum scarcity limits the fulfillment of demand for the proliferation in wireless services. Cognitive Radio Network (CRN) deploys its intelligence in solving the issue of spectrum scarcity. The CRN enables the unlicensed users (secondary users -SU) to utilize the licensed user s spectrum without causing interference when their spectrum is idle. The CRN autonomously detects the white spaces in the spectrum and allocates the free spectrum to the SU s by its functionalities such as Spectrum Sensing, Spectrum analysis, Spectrum mobility and sharing. The ability to reconfigure its parameters according to the user s necessity by lively monitoring the environment proves the intelligence of the CRN. Several SU s employ Cooperative Spectrum Sensing (CSS), by sharing their spectrum sensing results to cooperatively detect the presence of the Primary User (PU) Signal. Also CSS takes the advantage of overcoming the deterioration of detection of PU signal by fading and shadowing. newlineSecuring the CRN becomes a prime factor due to the wireless and reconfigurability nature of the CRN. Also the complete functionality of CRN depends on the spectrum sensing results, consequently any threat affecting the sensing reports would obliterate the system. Spectrum Sensing Data Falsification attack (SSDF) is the threat that affects the spectrum sensing results of the CRN, with the objective to maliciously grab the spectrum or to selfishly occupy the spectrum there by exempting genuine SU s from using the spectrum. Mitigating SSDF attack requires a cognitive approach as different types of attackers can cause this attack. newline
Pagination: xv,113p.
URI: http://hdl.handle.net/10603/480868
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File314.51 kBAdobe PDFView/Open
02_prelim pages.pdf3.18 MBAdobe PDFView/Open
03_content.pdf338.05 kBAdobe PDFView/Open
04_abstract.pdf328.6 kBAdobe PDFView/Open
05_chapter 1.pdf589.29 kBAdobe PDFView/Open
06_chapter 2.pdf526.57 kBAdobe PDFView/Open
07_chapter3 .pdf804.04 kBAdobe PDFView/Open
08_chapter 4.pdf1.23 MBAdobe PDFView/Open
09_chapter 5.pdf808.8 kBAdobe PDFView/Open
10_annexures.pdf191.6 kBAdobe PDFView/Open
80_recommendation.pdf681.24 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: