SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. II (Mar. – Apr. 2016), PP 61-64
www.iosrjournals.org
DOI: 10.9790/1676-1102026164 www.iosrjournals.org 61 | Page
A Review On Cross Layer Attack Aware Cognitive Radio
Networks with Multihop Routing
Neha P.Gogulwar1
, Ashish Manusmare2
1
Dept. of Electronics and Communication Engineering, Ballarpur Institute of Technology Bamni Ballarpur
(M.S.), India
2
Dept. of Electronics and Communication Engineering, Assistant Professor, Ballarpur Institute of Technology
Bamni Ballarpur (M.S.), India
Abstract: Cognitive Radio Networks (CRNs) with such spectrum aware devices is a hopeful solution to the
spectrum insufficiency issue in wireless communication area. It is viewed as a revolutionary potential radio
technology capable of offering dynamic spectrum contact. In this, an effective routing solution with a cross
layer design is proposed for the multi-hop CRNs. It is seen that the in cognitive radio based networks there are
cross layer attack which occur due to DDOS. Our work is concentrated on the issue of cross layer design for
routing in cognitive radios which have DDOS attacks. We will be providing a layer for attack removal in the
cross layer networks which will allow the system to provide efficiency in routing even under attacks .This will
help the network to perform effective routing even if DDOS attack occur In this work, a routing algorithm based
on Routing Protocols for Low power and lossy networks (RPL) is being proposed for the CRNs. Dynamic
spectrum distribution is also done along with routing with the help of RPL. MATLAB simulation is done to
analyse the effectiveness of the proposed algorithm.
Keywords: Cognitive Radio Network, Cross layer Routing, DDOS, Multi Hop Cognitive Radio Network, RPL
I. Introduction
Cognitive Radio (CR), recommended by Joseph Mitola III, is an developing wireless communication
model that can significantly improve the spectrum usage efficiency by offering dynamic spectrum access. CR
Networks (CRNs) is a spectrum aware devices to the spectrum scarcity issue in wireless communication.
Cognitive radio networks (CRNs) are composed of cognitive, spectrum devices capable of changing their
configurations on the fly based on the spectral environment. This capability opens up the possibility of
designing flexible and dynamic spectrum access strategies with the purpose of opportunistically reusing portions
of the spectrum temporarily vacated by licensed primary uses. This work focuses on the problem of an attack
aware cross layer routing .It improves the efficiency of network. In this paper, a brief overview of the CR
technology is provided followed by a detailed analysis of the security attacks pointing Cross layer Routing
protocol for multihop cognitive radio network .We aware the attacks with respect to the layer they target starting
from the physical layer and moving up to the transport layer.
Routing in cognitive radio networks (CRNs) needs a cross-layering method. However, CRN routing
protocols proposed in literature are partially cross-layer, for the reason that the information flow is only from
physical layer to network layer, e.g. about channels availabilities. cross-layer routing protocol (CLRP)introduces
, which considers both the channels that are known to be available at each node, as well as other channels that
may be available. The availabilities of the latter channels are considered using a stochastic approach. CLRP
computes an end to end path, and feeds the physical layer with information about which channels to sense and
which nodes should perform the sensing, such that the expected route quality is improved which channels to be
sensed.
Denial of Service (DoS) attacks is severe in all the attacks in security of wireless network. Also,
cognitive radio networks are vulnerable to DoS attack due to their own characteristics. DoS attacks in ad hoc
cognitive radio networks in different protocol layers Routing protocol being used in most of the existing work is
the Ad-hoc On-demand Distance Vector protocol. In AODV, the Route Request (RREQ) messages, which are
sent via spreading, contain locally obtained network state and deliver this detailed information to the destination,
where they are processed to compute path and the routing decisions being adopted at the destination are then
forwarded in the reverse path using the Route Reply (RREP) messages. Here comes the need for a protocol in
CRN that can perform the routing as the control packet moves from one point to another.
RPL is a distance vector routing protocol for LLNs. Network devices running the protocol are
connected in such a way that no cycles are present. For this purpose a Destination Oriented Directed Acyclic
Graph (DODAG), which is routed at a single destination is built. It is the main candidate for acting as a standard
routing protocol for Internet Protocol (IP) smart object networks. RPL is based on the topological concept of
Directed Acyclic Graphs (DAGs). In this algorithm, routing is performed through the construction of a colored
A Review On Cross Layer Attack Aware Cognitive Radio Networks With Multihop Routing
DOI: 10.9790/1676-1102026164 www.iosrjournals.org 62 | Page
Destination Oriented DAGs (DODAGs) with destination as the root and source(s) as the leaf node(s).
Connection frequencies are represented using different It determines the best route from a source to destination.
The algorithm selects the path with the minimum hop count and the minimum adjacent link interference as the
best path. Also, two nodes will communicate in a CRN only if there exists a common channel between them.
II. Literature Survey
Irin Sajan , Ebin M. Manuel (feb 2015)[1] this paper present an effective routing solution with a cross
layer design is proposed for the multi-hop CRNs. Most of the existing work uses Ad-hoc On-demand Distance
Vector (AODV) protocol as the routing protocol for CRNs. In this work, a novel routing algorithm based on
Routing Protocol for Low power and lossy networks (RPL) is being proposed for the CRNs. Routing is
accomplished through the formation of colored Destination Oriented Directed Acyclic Graphs (DODAGs) of
which the link frequencies are represented using colors. Hop count and adjacent link interference are counted as
the routing metrics. Dynamic spectrum allocation is also done along with routing with the help of RPL. The
CRN scenario is vulnerable to link failures due to the appearance of Primary Users (PUs). So route repairing
using the Trickle algorithm offered by RPL. RPL is found to be a suitable routing protocol that can be carried
out into the real CRN scenario.
Ramzi Saifan, Ahmed E.Kamal[2]A Cross-Layer Routing Protocol (CLRP) for Cognitive Radio
Network routing protocols proposed in literature are partially cross-layer, because the information flow is only
from physical layer to network layer, e.g., about channels availabilities. In this work, we introduce a cross-layer
routing protocol (CLRP), which considers both the channels that are known to be available at each node, as well
as other channels that may be available. The availabilities of the latter channels are considered using a stochastic
approach. CLRP computes an end to end path, and feeds the physical layer with information about which
channels to sense and which nodes should perform the sensing, such that the expected route quality is enhanced.
Simulation results show that CLRP outperforms other cross-layer routing protocols in terms of throughput and
stability of the path being setup, and increases the probability of finding an end-to-end path. In this paper we
proposed a new approach for routing in CRN.
Trong Nghia Le,[May 2015][3] In this paper, the channel-tap power is utilized as a radio-frequency
fingerprint (RF) to completely identify primary user emulation attacks (PUEAs) over multipath Rayleigh fading
channels. To accurately know identities of primary users (PUs) and PUEAs, the cross-layer intelligent learning
ability of a mobile secondary user (SU) is exploited to establish detection databases by seamlessly combining
the quick detection of physical (PHY) layer with the accuracy of higher layer authentication. The proposed
method helps PHY layer completely detect the identities of PUs and PUEAs. The uniqueness of channel-tap
powers between the SU and Txs is utilized as a RF to detect PUEA and PU in mobile CR networks. In addition,
this letter proposes cross-layer design to completely detect PUEA and PU based on detection databases
established by seamlessly combining the accuracy of higher layer authentication with the quick detection of
PHY layer. Simulations demonstrate that the proposed technique greatly enhances detection efficiency of PHY
layer.
Wassim El-Hajj, Haidar Safa,[March 11][4]In this Cognitive Radio (CR) is a novel technology that
promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary users
without causing interference to their communication. Although the operational aspects of CR are being explored
vigorously, its security aspects have gained little attention. In this paper, a brief overview of the CR technology
is provided followed by a detailed analysis of the security attacks targeting Cognitive Radio Networks (CRNs)
along with the corresponding mitigation techniques. We categorize the attacks with respect to the layer they
target starting from the physical layer and moving up to the transport layer. An evaluation of the suggested
counter measures is presented along with other solutions and augmentations to achieve a secure and trusted
CRN.
Azza Mohammed[Sep. 2015][5] MANET Mobile Ad hoc Network are evolved through various
characteristics such as shared media, this property make a routing protocols vulnerable. AODV is a reactive
routing where each intermediate node cooperates in the process of route discovery. In this case, the node that
behaves as malicious exploit the malfunction of specified service. The black hole attack uses the sequence
number that is used to select the freshest route and attract all exchanged data packets to destroy them. Many
researchers have dealt with this attack and many solutions have been proposed. These solutions target the
network layer only. In this paper, we present our approach to counter black hole attack. This approach is entitled
Cross AODV and it is based on verification and validation process. The key point of our approach is the use of
the inter layer interaction between networks layer and medium access within the distributed coordination
function (DCF) to efficiently detect and isolate malicious nodes. During the route discovery, the verification
process uses the RTS or CTS frame that contains information about the requested path. The validation process
consists of comparing the routing information with the result of verification phase. Our Approach have been
A Review On Cross Layer Attack Aware Cognitive Radio Networks With Multihop Routing
DOI: 10.9790/1676-1102026164 www.iosrjournals.org 63 | Page
implemented, simulated and compared to two related studies using the well know NS2 Simulator. The obtained
results show the efficacy our proposal in term of packet delivery with a neglected additional delay.
Wang Weifang[2010][6] Denial of Service (DoS) attacks is severe in all the attacks in security of
wireless network. Furthermore, cognitive radio networks are vulnerable to DoS attack due to their own
characteristics. This paper analyzed the architecture of cognitive radio networks and emphatically discussed the
possible various DoS attacks in ad hoc cognitive radio networks in different protocol layers. surveyed the denial
of service attacks in different protocol layer in ad hoc cognitive radio networks. We concluded that adversaries
can launch DoS attacks in every layer in ad cognitive radio networks after analysis. Protection against DoS
attacks in cognitive radio networks requires a careful cross-layer design.
Tsvetko Tsvetkov[july2011][7] Low Power and Lossy Networks (LLNs) represent one of the most
interesting research areas. They include Wireless Personal Area Networks (WPANs), low-power Power Line
Communication (PLC) networks and Wireless Sensor Networks (WSNs). Such networks are often optimized to
save energy, support traffic patterns different from the standard unicast communication, run routing protocols
over link layers with restricted frame-sizes and many others . This paper presents the IPv6 Routing Protocol for
Low power and Lossy Networks (RPL) , which has been designed to overcome routing issues in LLNs. It
implements measures to reduce energy consumption such as dynamic sending rate of control messages and
addressing topology inconsistencies only when data packets have to be sent. The protocol makes use of IPv6
and supports not only traffic in the upward direction, but also traffic flowing from a gateway node to all other
network participants.
Natarajan Meghanathan [2013][8] We present a critical review and analysis of different categories of
routing protocols for cognitive radio networks. We first classify the available solutions to two broad categories:
those based on full spectrum knowledge (typically used to establish performance benchmarks) and those based
on local spectrum knowledge (used for real-time implementation). The full spectrum gen based routing solutions
are analyzed from a graph-theoretic point of view, and we review the layered graph, edge coloring and conflict
graph models. We classify the various local spectrum knowledge based routing protocols into the following five
categories: Lowest power, Minimum delay, Maximum throughput, Geographic and Class-based routing. A total
of 25 routing protocols proposed for cognitive radio networks have been reviewed. We discuss the working
principle and analyze the pros and cons of the routing protocols. Finally, we propose an idea of a load
balancing-based resident spectrum knowledge-based routing protocol for cognitive radio ad hoc networks. In
this paper, we have presented an exhaustive review and analysis of the routing protocols that have been
proposed in the literature for cognitive radio networks. In fact, a licensed user need not be even aware of the
presence of the unlicensed CR users, and there should be no appreciable degradation in the quality of service for
the primary users. While the routing solutions proposed for centralized and/or infrastructure based CRNs are
typically construed to provide performance benchmarks, the solutions proposed for dispersed/cooperative and/or
infrastructure less ad hoc CRNs capture the practical difficulties and performance bottlenecks in real-time
implementations.
Hicham Khalife, Naceur Malouch, Serge Fdida [8/10/2010][9]Routing is a fundamental issue to
consider when dealing with multihop cognitive radio networks. We investigate in this work, the potential
routing approaches that can be employed in such adaptive wireless networks. We argue that in multihop
cognitive radio environments no general routing solution can be proposed but cognitive environments can be
classified into three separate categories, each requiring specific routing solutions. Basically, this classification is
imposed by the activity of the users on the licensed bands that cognitive radios try to access. First, over a
relatively static primary band, where primary nodes idleness largely exceeds cognitive users communication
durations, static mesh routing solutions can be reused, whereas second, over dynamically available spectrum
bands new specific routing solutions have to be proposed, we give some guidelines and insights about designing
such solutions. Third, if cognitive radios try to access over highly active and rarely available primary bands,
opportunistic forwarding without pre-established routing is to be explored . Multihop cognitive radios is one of
the most promising research area in already well explored wireless environments. A growing number of
solutions targeting essentially routing and channel assignment in such environments are getting proposed by the
research community no one has a clear vision on how multihop cognitive radios will look like and what is the
time granularity the primary nodes will offer to cognitive radios communications. For this reason, we focus in
this paper on multihop cognitive radio networks and on the routing solutions they can support. Essentially, we
categorize cognitive radio networks into three separate categories depending on the timescale of the primary
bands idle time compared to the cognitive communication duration. In fact, if the availability periods of the
primary bands is greatly larger than the CR exchanges, the created multihop can be considered as a static mesh.
A Review On Cross Layer Attack Aware Cognitive Radio Networks With Multihop Routing
DOI: 10.9790/1676-1102026164 www.iosrjournals.org 64 | Page
III. Methodology
In the previous researchers have focused mainly on the cross layer routing and mutihop cognitive radio
networks. The protocols work perfectly in scenario where network attack are non-imminent. But this is not the
case normally, usually in cognitive radio based network there are cross layer attacks which occur due to DDOS.
Our focussed is on the issue of cross layer design for routing in cognitive radios which have DDOS attack. We
will working on a network layer for attack removal in the cross layer networks which will allow the system to
provide efficiency in routing even under attacks. This will help the network to perform effective routing even if
DDOS attacks occur and it will increase the efficiency with greatest throught.
IV. Conclusion
In this paper, we studied the different research papers. Routing in cognitive radio network has attracted
a lot of attention to the researcher’s in the recent years. Routing in multi hop cognitive network is a new
research area with a limited but rapidly growing set of results. In last few years attacks on cross layer routing
protocol in multihop cognitive radio has become one of the most important research area in cognitive radio
network. The main objective behind developing one layer which having DDOS attack will allow the system to
provide more efficiency in routing even under attacks. We shall compare the efficiency of our proposed
technique with the technique mentioned in the base work for checking performance improvement .This will help
in improving energy efficiency in Multihop Cognitive Radio NetworkTo ensure a high-quality product,
diagrams and lettering MUST be either computer-drafted or drawn using India ink.
Acknowledgements
We would like to thank Department of Electronics and Communication Engineering, BIT Ballarpur for
providing the infrastructure and guidance for understanding the technical aspects of an attack which occur on
cross layering.
References
[1]. Irin Sajan, Ebin M. Manuel [feb 2015] , “Cross Layer Routing Design Based on RPL for Multi-hop Cognitive Radio Networks”
978-1-4799-1823-2/1/$31.00 ©2015 IEEE
[2]. Ramzi Saifan, Ahmed E.Kamal “A Cross-Layer Routing Protocol (CLRP) for Cognitive Radio Network.”
[3]. Trong Nghia Le,[May 2015] “Cross-Layer Design for Primary User Emulation Attacks Detection in Mobile Cognitive Radio
Networks” IEEE COMMUNICATIONS LETTERS, VOL. 19, NO. 5, MAY 2015
[4]. Wassim El-Hajj, Haidar Safa,[March 11] “Survey of Security Issues in Cognitive Radio Networks” JOURNAL OF INTERNET
TECHNOLOGY · MARCH 2011
[5]. Azza Mohammed[Sep. 2015] “ A Cross Layer for Detection and Ignoring Black Hole Attack in MANET”10.5815/ijcnis.2015.10.05
[6]. Wang Weifang “Denial of Service Attacks in Cognitive Radio Networks” 2010 2nd Conference on Environmental Science and
Information Application Technology
[7]. Tsvetko Tsvetkov[july 2011] “RPL: IPv6 Routing Protocol for Low Power and Lossy Networks” 10.2313/NET-2011-07-1_09
[8]. Natarajan Meghanathan [2013]A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO
NETWORKS AND A PROPOSAL FOR LOAD BALANCING LOCAL SPECTRUM KNOWLEDGEBASED ROUTING , DOI :
10.5121/csit.2013.3702
[9]. Hicham Khalife, Naceur Malouch, Serge Fdida[8/10/2010] Multihop Cognitive Radio Networks: to Route or not to Route IEEE
Network, Institute of Electrical and Electronics Engineers, 2009, 23 (4), pp.20-25. <10.1109/MNET.2009.5191142>. <hal-
00524785>

More Related Content

What's hot

Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...ijwmn
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location InformationIJMER
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyIJERA Editor
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projectsVijay Karan
 
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSIJEEE
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio NetworksSensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio NetworksIRJET Journal
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 

What's hot (20)

Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
172 179
172 179172 179
172 179
 
9517cnc06
9517cnc069517cnc06
9517cnc06
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
Routing in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A SurveyRouting in Cognitive Radio Networks - A Survey
Routing in Cognitive Radio Networks - A Survey
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKS
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor Networks
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio NetworksSensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 

Viewers also liked (20)

curriculam vitae
curriculam vitaecurriculam vitae
curriculam vitae
 
Madcom analyzes the need for broadband in eastern pa
Madcom analyzes the need for broadband in eastern paMadcom analyzes the need for broadband in eastern pa
Madcom analyzes the need for broadband in eastern pa
 
F011113741
F011113741F011113741
F011113741
 
E1303021829
E1303021829E1303021829
E1303021829
 
D010312230
D010312230D010312230
D010312230
 
D012531923
D012531923D012531923
D012531923
 
D018132226
D018132226D018132226
D018132226
 
LordJeshuainheritancemay2016
LordJeshuainheritancemay2016LordJeshuainheritancemay2016
LordJeshuainheritancemay2016
 
dissertation_final_sarpakunnas
dissertation_final_sarpakunnasdissertation_final_sarpakunnas
dissertation_final_sarpakunnas
 
I0814852
I0814852I0814852
I0814852
 
I017125357
I017125357I017125357
I017125357
 
TireAngel Telematics 2014-12
TireAngel Telematics 2014-12TireAngel Telematics 2014-12
TireAngel Telematics 2014-12
 
startup_inside_FINAL
startup_inside_FINALstartup_inside_FINAL
startup_inside_FINAL
 
G1303023948
G1303023948G1303023948
G1303023948
 
G017664551
G017664551G017664551
G017664551
 
B018110610
B018110610B018110610
B018110610
 
I012536474
I012536474I012536474
I012536474
 
I1302045763
I1302045763I1302045763
I1302045763
 
R130304103108
R130304103108R130304103108
R130304103108
 
F1302033340
F1302033340F1302033340
F1302033340
 

Similar to J1102026164

ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
 
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...IJCNCJournal
 
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...IJCNCJournal
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
Enhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkEnhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkIRJET Journal
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...IJCNCJournal
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...IJCNCJournal
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
 
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...IJECEIAES
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSpharmaindexing
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETidescitation
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)IISRT
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
 

Similar to J1102026164 (20)

ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection Based Heuristic Optimization Model for the Scheduling ...
 
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
Random Relay Selection based Heuristic Optimization Model for the Scheduling ...
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Enhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio NetworkEnhancing Opportunistic Routing for Cognitive Radio Network
Enhancing Opportunistic Routing for Cognitive Radio Network
 
ijetcas14 650
ijetcas14 650ijetcas14 650
ijetcas14 650
 
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industri...
 
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
CROSS LAYERING USING REINFORCEMENT LEARNING IN COGNITIVE RADIO-BASED INDUSTRI...
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
G010323739
G010323739G010323739
G010323739
 
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
Throughput Maximization of Cognitive Radio Multi Relay Network with Interfere...
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)
 
J0935461
J0935461J0935461
J0935461
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

J1102026164

  • 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. II (Mar. – Apr. 2016), PP 61-64 www.iosrjournals.org DOI: 10.9790/1676-1102026164 www.iosrjournals.org 61 | Page A Review On Cross Layer Attack Aware Cognitive Radio Networks with Multihop Routing Neha P.Gogulwar1 , Ashish Manusmare2 1 Dept. of Electronics and Communication Engineering, Ballarpur Institute of Technology Bamni Ballarpur (M.S.), India 2 Dept. of Electronics and Communication Engineering, Assistant Professor, Ballarpur Institute of Technology Bamni Ballarpur (M.S.), India Abstract: Cognitive Radio Networks (CRNs) with such spectrum aware devices is a hopeful solution to the spectrum insufficiency issue in wireless communication area. It is viewed as a revolutionary potential radio technology capable of offering dynamic spectrum contact. In this, an effective routing solution with a cross layer design is proposed for the multi-hop CRNs. It is seen that the in cognitive radio based networks there are cross layer attack which occur due to DDOS. Our work is concentrated on the issue of cross layer design for routing in cognitive radios which have DDOS attacks. We will be providing a layer for attack removal in the cross layer networks which will allow the system to provide efficiency in routing even under attacks .This will help the network to perform effective routing even if DDOS attack occur In this work, a routing algorithm based on Routing Protocols for Low power and lossy networks (RPL) is being proposed for the CRNs. Dynamic spectrum distribution is also done along with routing with the help of RPL. MATLAB simulation is done to analyse the effectiveness of the proposed algorithm. Keywords: Cognitive Radio Network, Cross layer Routing, DDOS, Multi Hop Cognitive Radio Network, RPL I. Introduction Cognitive Radio (CR), recommended by Joseph Mitola III, is an developing wireless communication model that can significantly improve the spectrum usage efficiency by offering dynamic spectrum access. CR Networks (CRNs) is a spectrum aware devices to the spectrum scarcity issue in wireless communication. Cognitive radio networks (CRNs) are composed of cognitive, spectrum devices capable of changing their configurations on the fly based on the spectral environment. This capability opens up the possibility of designing flexible and dynamic spectrum access strategies with the purpose of opportunistically reusing portions of the spectrum temporarily vacated by licensed primary uses. This work focuses on the problem of an attack aware cross layer routing .It improves the efficiency of network. In this paper, a brief overview of the CR technology is provided followed by a detailed analysis of the security attacks pointing Cross layer Routing protocol for multihop cognitive radio network .We aware the attacks with respect to the layer they target starting from the physical layer and moving up to the transport layer. Routing in cognitive radio networks (CRNs) needs a cross-layering method. However, CRN routing protocols proposed in literature are partially cross-layer, for the reason that the information flow is only from physical layer to network layer, e.g. about channels availabilities. cross-layer routing protocol (CLRP)introduces , which considers both the channels that are known to be available at each node, as well as other channels that may be available. The availabilities of the latter channels are considered using a stochastic approach. CLRP computes an end to end path, and feeds the physical layer with information about which channels to sense and which nodes should perform the sensing, such that the expected route quality is improved which channels to be sensed. Denial of Service (DoS) attacks is severe in all the attacks in security of wireless network. Also, cognitive radio networks are vulnerable to DoS attack due to their own characteristics. DoS attacks in ad hoc cognitive radio networks in different protocol layers Routing protocol being used in most of the existing work is the Ad-hoc On-demand Distance Vector protocol. In AODV, the Route Request (RREQ) messages, which are sent via spreading, contain locally obtained network state and deliver this detailed information to the destination, where they are processed to compute path and the routing decisions being adopted at the destination are then forwarded in the reverse path using the Route Reply (RREP) messages. Here comes the need for a protocol in CRN that can perform the routing as the control packet moves from one point to another. RPL is a distance vector routing protocol for LLNs. Network devices running the protocol are connected in such a way that no cycles are present. For this purpose a Destination Oriented Directed Acyclic Graph (DODAG), which is routed at a single destination is built. It is the main candidate for acting as a standard routing protocol for Internet Protocol (IP) smart object networks. RPL is based on the topological concept of Directed Acyclic Graphs (DAGs). In this algorithm, routing is performed through the construction of a colored
  • 2. A Review On Cross Layer Attack Aware Cognitive Radio Networks With Multihop Routing DOI: 10.9790/1676-1102026164 www.iosrjournals.org 62 | Page Destination Oriented DAGs (DODAGs) with destination as the root and source(s) as the leaf node(s). Connection frequencies are represented using different It determines the best route from a source to destination. The algorithm selects the path with the minimum hop count and the minimum adjacent link interference as the best path. Also, two nodes will communicate in a CRN only if there exists a common channel between them. II. Literature Survey Irin Sajan , Ebin M. Manuel (feb 2015)[1] this paper present an effective routing solution with a cross layer design is proposed for the multi-hop CRNs. Most of the existing work uses Ad-hoc On-demand Distance Vector (AODV) protocol as the routing protocol for CRNs. In this work, a novel routing algorithm based on Routing Protocol for Low power and lossy networks (RPL) is being proposed for the CRNs. Routing is accomplished through the formation of colored Destination Oriented Directed Acyclic Graphs (DODAGs) of which the link frequencies are represented using colors. Hop count and adjacent link interference are counted as the routing metrics. Dynamic spectrum allocation is also done along with routing with the help of RPL. The CRN scenario is vulnerable to link failures due to the appearance of Primary Users (PUs). So route repairing using the Trickle algorithm offered by RPL. RPL is found to be a suitable routing protocol that can be carried out into the real CRN scenario. Ramzi Saifan, Ahmed E.Kamal[2]A Cross-Layer Routing Protocol (CLRP) for Cognitive Radio Network routing protocols proposed in literature are partially cross-layer, because the information flow is only from physical layer to network layer, e.g., about channels availabilities. In this work, we introduce a cross-layer routing protocol (CLRP), which considers both the channels that are known to be available at each node, as well as other channels that may be available. The availabilities of the latter channels are considered using a stochastic approach. CLRP computes an end to end path, and feeds the physical layer with information about which channels to sense and which nodes should perform the sensing, such that the expected route quality is enhanced. Simulation results show that CLRP outperforms other cross-layer routing protocols in terms of throughput and stability of the path being setup, and increases the probability of finding an end-to-end path. In this paper we proposed a new approach for routing in CRN. Trong Nghia Le,[May 2015][3] In this paper, the channel-tap power is utilized as a radio-frequency fingerprint (RF) to completely identify primary user emulation attacks (PUEAs) over multipath Rayleigh fading channels. To accurately know identities of primary users (PUs) and PUEAs, the cross-layer intelligent learning ability of a mobile secondary user (SU) is exploited to establish detection databases by seamlessly combining the quick detection of physical (PHY) layer with the accuracy of higher layer authentication. The proposed method helps PHY layer completely detect the identities of PUs and PUEAs. The uniqueness of channel-tap powers between the SU and Txs is utilized as a RF to detect PUEA and PU in mobile CR networks. In addition, this letter proposes cross-layer design to completely detect PUEA and PU based on detection databases established by seamlessly combining the accuracy of higher layer authentication with the quick detection of PHY layer. Simulations demonstrate that the proposed technique greatly enhances detection efficiency of PHY layer. Wassim El-Hajj, Haidar Safa,[March 11][4]In this Cognitive Radio (CR) is a novel technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary users without causing interference to their communication. Although the operational aspects of CR are being explored vigorously, its security aspects have gained little attention. In this paper, a brief overview of the CR technology is provided followed by a detailed analysis of the security attacks targeting Cognitive Radio Networks (CRNs) along with the corresponding mitigation techniques. We categorize the attacks with respect to the layer they target starting from the physical layer and moving up to the transport layer. An evaluation of the suggested counter measures is presented along with other solutions and augmentations to achieve a secure and trusted CRN. Azza Mohammed[Sep. 2015][5] MANET Mobile Ad hoc Network are evolved through various characteristics such as shared media, this property make a routing protocols vulnerable. AODV is a reactive routing where each intermediate node cooperates in the process of route discovery. In this case, the node that behaves as malicious exploit the malfunction of specified service. The black hole attack uses the sequence number that is used to select the freshest route and attract all exchanged data packets to destroy them. Many researchers have dealt with this attack and many solutions have been proposed. These solutions target the network layer only. In this paper, we present our approach to counter black hole attack. This approach is entitled Cross AODV and it is based on verification and validation process. The key point of our approach is the use of the inter layer interaction between networks layer and medium access within the distributed coordination function (DCF) to efficiently detect and isolate malicious nodes. During the route discovery, the verification process uses the RTS or CTS frame that contains information about the requested path. The validation process consists of comparing the routing information with the result of verification phase. Our Approach have been
  • 3. A Review On Cross Layer Attack Aware Cognitive Radio Networks With Multihop Routing DOI: 10.9790/1676-1102026164 www.iosrjournals.org 63 | Page implemented, simulated and compared to two related studies using the well know NS2 Simulator. The obtained results show the efficacy our proposal in term of packet delivery with a neglected additional delay. Wang Weifang[2010][6] Denial of Service (DoS) attacks is severe in all the attacks in security of wireless network. Furthermore, cognitive radio networks are vulnerable to DoS attack due to their own characteristics. This paper analyzed the architecture of cognitive radio networks and emphatically discussed the possible various DoS attacks in ad hoc cognitive radio networks in different protocol layers. surveyed the denial of service attacks in different protocol layer in ad hoc cognitive radio networks. We concluded that adversaries can launch DoS attacks in every layer in ad cognitive radio networks after analysis. Protection against DoS attacks in cognitive radio networks requires a careful cross-layer design. Tsvetko Tsvetkov[july2011][7] Low Power and Lossy Networks (LLNs) represent one of the most interesting research areas. They include Wireless Personal Area Networks (WPANs), low-power Power Line Communication (PLC) networks and Wireless Sensor Networks (WSNs). Such networks are often optimized to save energy, support traffic patterns different from the standard unicast communication, run routing protocols over link layers with restricted frame-sizes and many others . This paper presents the IPv6 Routing Protocol for Low power and Lossy Networks (RPL) , which has been designed to overcome routing issues in LLNs. It implements measures to reduce energy consumption such as dynamic sending rate of control messages and addressing topology inconsistencies only when data packets have to be sent. The protocol makes use of IPv6 and supports not only traffic in the upward direction, but also traffic flowing from a gateway node to all other network participants. Natarajan Meghanathan [2013][8] We present a critical review and analysis of different categories of routing protocols for cognitive radio networks. We first classify the available solutions to two broad categories: those based on full spectrum knowledge (typically used to establish performance benchmarks) and those based on local spectrum knowledge (used for real-time implementation). The full spectrum gen based routing solutions are analyzed from a graph-theoretic point of view, and we review the layered graph, edge coloring and conflict graph models. We classify the various local spectrum knowledge based routing protocols into the following five categories: Lowest power, Minimum delay, Maximum throughput, Geographic and Class-based routing. A total of 25 routing protocols proposed for cognitive radio networks have been reviewed. We discuss the working principle and analyze the pros and cons of the routing protocols. Finally, we propose an idea of a load balancing-based resident spectrum knowledge-based routing protocol for cognitive radio ad hoc networks. In this paper, we have presented an exhaustive review and analysis of the routing protocols that have been proposed in the literature for cognitive radio networks. In fact, a licensed user need not be even aware of the presence of the unlicensed CR users, and there should be no appreciable degradation in the quality of service for the primary users. While the routing solutions proposed for centralized and/or infrastructure based CRNs are typically construed to provide performance benchmarks, the solutions proposed for dispersed/cooperative and/or infrastructure less ad hoc CRNs capture the practical difficulties and performance bottlenecks in real-time implementations. Hicham Khalife, Naceur Malouch, Serge Fdida [8/10/2010][9]Routing is a fundamental issue to consider when dealing with multihop cognitive radio networks. We investigate in this work, the potential routing approaches that can be employed in such adaptive wireless networks. We argue that in multihop cognitive radio environments no general routing solution can be proposed but cognitive environments can be classified into three separate categories, each requiring specific routing solutions. Basically, this classification is imposed by the activity of the users on the licensed bands that cognitive radios try to access. First, over a relatively static primary band, where primary nodes idleness largely exceeds cognitive users communication durations, static mesh routing solutions can be reused, whereas second, over dynamically available spectrum bands new specific routing solutions have to be proposed, we give some guidelines and insights about designing such solutions. Third, if cognitive radios try to access over highly active and rarely available primary bands, opportunistic forwarding without pre-established routing is to be explored . Multihop cognitive radios is one of the most promising research area in already well explored wireless environments. A growing number of solutions targeting essentially routing and channel assignment in such environments are getting proposed by the research community no one has a clear vision on how multihop cognitive radios will look like and what is the time granularity the primary nodes will offer to cognitive radios communications. For this reason, we focus in this paper on multihop cognitive radio networks and on the routing solutions they can support. Essentially, we categorize cognitive radio networks into three separate categories depending on the timescale of the primary bands idle time compared to the cognitive communication duration. In fact, if the availability periods of the primary bands is greatly larger than the CR exchanges, the created multihop can be considered as a static mesh.
  • 4. A Review On Cross Layer Attack Aware Cognitive Radio Networks With Multihop Routing DOI: 10.9790/1676-1102026164 www.iosrjournals.org 64 | Page III. Methodology In the previous researchers have focused mainly on the cross layer routing and mutihop cognitive radio networks. The protocols work perfectly in scenario where network attack are non-imminent. But this is not the case normally, usually in cognitive radio based network there are cross layer attacks which occur due to DDOS. Our focussed is on the issue of cross layer design for routing in cognitive radios which have DDOS attack. We will working on a network layer for attack removal in the cross layer networks which will allow the system to provide efficiency in routing even under attacks. This will help the network to perform effective routing even if DDOS attacks occur and it will increase the efficiency with greatest throught. IV. Conclusion In this paper, we studied the different research papers. Routing in cognitive radio network has attracted a lot of attention to the researcher’s in the recent years. Routing in multi hop cognitive network is a new research area with a limited but rapidly growing set of results. In last few years attacks on cross layer routing protocol in multihop cognitive radio has become one of the most important research area in cognitive radio network. The main objective behind developing one layer which having DDOS attack will allow the system to provide more efficiency in routing even under attacks. We shall compare the efficiency of our proposed technique with the technique mentioned in the base work for checking performance improvement .This will help in improving energy efficiency in Multihop Cognitive Radio NetworkTo ensure a high-quality product, diagrams and lettering MUST be either computer-drafted or drawn using India ink. Acknowledgements We would like to thank Department of Electronics and Communication Engineering, BIT Ballarpur for providing the infrastructure and guidance for understanding the technical aspects of an attack which occur on cross layering. References [1]. Irin Sajan, Ebin M. Manuel [feb 2015] , “Cross Layer Routing Design Based on RPL for Multi-hop Cognitive Radio Networks” 978-1-4799-1823-2/1/$31.00 ©2015 IEEE [2]. Ramzi Saifan, Ahmed E.Kamal “A Cross-Layer Routing Protocol (CLRP) for Cognitive Radio Network.” [3]. Trong Nghia Le,[May 2015] “Cross-Layer Design for Primary User Emulation Attacks Detection in Mobile Cognitive Radio Networks” IEEE COMMUNICATIONS LETTERS, VOL. 19, NO. 5, MAY 2015 [4]. Wassim El-Hajj, Haidar Safa,[March 11] “Survey of Security Issues in Cognitive Radio Networks” JOURNAL OF INTERNET TECHNOLOGY · MARCH 2011 [5]. Azza Mohammed[Sep. 2015] “ A Cross Layer for Detection and Ignoring Black Hole Attack in MANET”10.5815/ijcnis.2015.10.05 [6]. Wang Weifang “Denial of Service Attacks in Cognitive Radio Networks” 2010 2nd Conference on Environmental Science and Information Application Technology [7]. Tsvetko Tsvetkov[july 2011] “RPL: IPv6 Routing Protocol for Low Power and Lossy Networks” 10.2313/NET-2011-07-1_09 [8]. Natarajan Meghanathan [2013]A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A PROPOSAL FOR LOAD BALANCING LOCAL SPECTRUM KNOWLEDGEBASED ROUTING , DOI : 10.5121/csit.2013.3702 [9]. Hicham Khalife, Naceur Malouch, Serge Fdida[8/10/2010] Multihop Cognitive Radio Networks: to Route or not to Route IEEE Network, Institute of Electrical and Electronics Engineers, 2009, 23 (4), pp.20-25. <10.1109/MNET.2009.5191142>. <hal- 00524785>