Malicious User Detection in Cooperative Environment in Cognitive Radio NetworksJournal: International Journal of Science and Research (IJSR) (Vol.2, No. 3)
Publication Date: 2013-03-05
Authors : Sripriya. N; Geetha Ramani. J;
Page : 71-74
Keywords : Cognitive Radio; Primary User; Secondary User; Cooperative Spectrum Sensing; Security;
Cognitive radio efficiently utilizes the unused spectrum for secondary usage without interfering a primary licensed user. In cooperative environment, a primary licensed user can share spectrum occupancy information with a secondary user to enable dynamic spectrum access. However, a secondary user needs to verify accuracy of the spectrum occupancy information and it comes the legitimate primary users. Without the verification, a malicious user can falsify the spectrum occupancy information. This can result interference to the primary users and minimize available spectrum for the secondary usage. Proposed technique verifies that the source of the spectrum occupancy information is from the legitimate primary user thereby maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.
Other Latest Articles
Last modified: 2021-06-30 20:14:29