ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Malicious User Detection in Cooperative Environment in Cognitive Radio Networks

Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 3)

Publication Date:

Authors : ; ;

Page : 71-74

Keywords : Cognitive Radio; Primary User; Secondary User; Cooperative Spectrum Sensing; Security;

Source : Downloadexternal Find it from : Google Scholarexternal


Cognitive radio efficiently utilizes the unused spectrum for secondary usage without interfering a primary licensed user. In cooperative environment, a primary licensed user can share spectrum occupancy information with a secondary user to enable dynamic spectrum access. However, a secondary user needs to verify accuracy of the spectrum occupancy information and it comes the legitimate primary users. Without the verification, a malicious user can falsify the spectrum occupancy information. This can result interference to the primary users and minimize available spectrum for the secondary usage. Proposed technique verifies that the source of the spectrum occupancy information is from the legitimate primary user thereby maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.

Last modified: 2021-06-30 20:14:29