LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING LABYRINTHINE AUTHENTICATION FORMULA
DOI:
https://doi.org/10.11113/jt.v76.2860Keywords:
Cognitive radio network, authentication, securityAbstract
Facilities for different sight and sound provisions in remote systems requests extra transmission capacity in the radio frequency range. Effective range administration calculations are important to accomplish massive accomplishment in remote correspondences. Usage of licensed spectrum is increasing day by day so Cognitive Radio is proposed as a solution to meet the demands. CR is a symbolization procedure that distributes the authorized range (the licensed spectrum) despite the fact that facing least obstruction to the authorized clients. In this paper, we investigate the versatile qualities of cognitive radio in secure and dependable correspondence. Anyway the inquiry is the way to make the correspondence dependable such that there happens no spying and data spillage. The conceivable results incorporate coordinating the benefits of spread range balance, utilizing encryption calculations (Encryption keys), and its possibility to switch over different recurrence groups. We concentrate on the different requisitions of CR and the various philosophies which empower a safe Communication system.Â
References
R. Pal, et al. 2008. Characterizing Reliability In Cognitive Radio Networks. First International Symposium on Applied Sciences on Biomedical and Communication Technologies, 2008. 1-6, 25-28 Oct.
E. Trigui et al. 2013. A Mobility Scheme for Cognitive Radio Networks. 12th Annual Mediterranean of Ad Hoc Networking Workshop (MED-HOC-NET), 2013. 102: 24-26 June.
V. Marojevic, et al. 2007. Integrated Resource Management in Cognitive Radio. 16th IST on Mobile and Wireless Communications Summit, 2007. 1(5): 1-5 July.
J. Mitola III, 2000. Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio. Ph.D. Thesis, Swedish Royal Institute of Technology.
S. Ball, A. Ferguson, and T. W. Rondeau. 2005. Consumer Applications of Cognitive Radio Defined Networks. First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySpan’05. 518-525, Nov.
A. Gorcin and H. Arslan. 2008. Public Safety and Emergency Case Communications: Opportunities from the Aspect of Cognitive Radio. 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks. 1-10, Oct.
A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney. 2011. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks. IEEE Transactions on Signal Processing. 59: 774-786.
S. Liu, Q. Liu, J. Gao, and J. Guan. 2011. Attacker-exclusion Scheme for Cooperative Spectrum Sensing Against SSDF Attacks Based On Accumulated Suspicious Level. IEEE International Conference on Cyber Technology in Automation. Control, and Intelligent Systems (CYBER). 239-243.
A. G. Fragkiadakis, et al. 2013. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks. IEEE Communications Surveys & Tutorials. 15(1): 428-445.
L. Duan, A. W. Min, J. Huang, and K. G. Shin. 2012. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks. IEEE Journal on Selected Areas in Communications. 30: 1658-1665.
R. E. Ziemer. 2007. Fundamentals of Spread Spectrum Modulation, Colorado Springs: Morgan & Claypool Publishers.
A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney. 2010. Countering Byzantine Attacks in Cognitive Radio Networks. IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). 3098-3101.
S. Haykin, D. J. Thomson, and J. H. Reed. 2009. Spectrum Sensing for Cognitive Radio. Proceedings of the IEEE. 97: 849-877.
L. Freitas, Y. Pires, J. Morais, J. Costa, and A. Klautau. 2012. Data Mining Applied to Cognitive Radio Systems.
C. N. Mathur and K. Subbalakshmi. 2007. Digital signatures for centralized DSA networks. Proc. First IEEE Workshop on Cognitive Radio Net- works, CCNC), Las Vegas, NE, Jan. 11.
Y.-C. Liang, H.-H. Chen, J. Mitolla III, P. Mahonen, R. Kohno and J. H. Reed. 2008. Cognitive Radio: Theory and Applications. IEEE Journal on Selected Areas in Communications. 26(1): Jan.
C. Ghosh. 2009. Innovative Approaches to Spectrum Selection, Sensing, and Sharing in Cognitive Radio Networks, PhD Thesis, University of Cincinnati, May.
Downloads
Published
Issue
Section
License
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.