Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

A Survey: Detection Techniques on Selfish & Multi-Selfish Attacks in Cognitive Radio Networks

Author : Vanitha K.C 1 Dr. Bharathi S.H 2 Vidyasagar K.N 3

Date of Publication :7th May 2016

Abstract: Cognitive radio network is a rare communication technology which suggests the Unlicensed persons to use more amount of bandwidth existing in the spectrum which is not used by licensed persons. CRN identifies large number of available communication channels in spectrum very efficiently. The free spectrum of CRN is used by the users who are Unlicensed without harming the licensed users (PU) which are involved in communication. The main goal of CRN is to solve the problem of Spectrum Scarcity by making the unlicensed user to use the spectrum when it is free that means when the licensed user (PU) will not use the spectrum that time the unlicensed user can use it dynamically. Advantage of CR is to provide efficient data transmission without the breakup in the comminucation.CRN faces problems on selfish attacks which are carried out by the SU which sends fake information to the person near to SU as that to occupy all free channels available in spectrum. Selfish SU Nodes and Multi-selfish SU Nodes are degrading the performance by sending fake message to closer nodes of CRN. Here we suggested how to identify Selfish and Multi-selfish SU nodes by the two different algorithms based on survey.

Reference :

  1. [1] S.Li et al., (2012),”Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network”, IEEE INFOCOM‟ 12, pp. 729–37

    [2] Z. Gao et al., (2012),”Security and Privacy of Collaborative Spectrum Sensing in Cognitive Radio Networks”, IEEE Wireless Commun., vol. 19, no. 6, pp. 106–12.

    [3] Minho Jo, Longzhe Han, Dohoon Kim, and Hoh Peter (May 2013), “Selfish Attacks and Detection in Cognitive Radio Networks”, Korea University.vol 27, Issue: 3, IEEE Network.

    [4] “A Survey of Techniques Used Detect Selfish Nodes in MANET”, Karthik.M, Jyothish K John, International Journal for scientific Research & Development /Vol.1, Issue 4,2013.

    [5] Jae-Ho Choi, Kyu-Sun Shim, Sangkeun Lee, and KunLung Wu (2012),”Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network‟ , IEEE Transactions on mobile computing,vol.11 no.2.

    [6] E. Hossain, D. Niyato, and Z. Han, Dynamic Spectrum Access in Cognitive Radio Networks, Cambridge University Press, 2009

    [7] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, ―NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey,‖ Elsevier Computer Networks Journal, Vol. 50, Sept. 2006,pp.2127–2159


Recent Article