SlideShare a Scribd company logo
http://www.iaeme.com/IJECET/index.asp 59 editor@iaeme.com
International Journal of Electronics and Communication Engineering and Technology
(IJECET)
Volume 7, Issue 3, May–June 2016, pp. 59–67, Article ID: IJECET_07_03_008
Available online at
http://www.iaeme.com/IJECET/issues.asp?JType=IJECET&VType=7&IType=3
Journal Impact Factor (2016): 8.2691 (Calculated by GISI) www.jifactor.com
ISSN Print: 0976-6464 and ISSN Online: 0976-6472
© IAEME Publication
DATA FALSIFICATION LENIENT SECURE
SPECTRUM SENSING BY COGNITIVE
USER RELIABILITY VERIFICATION
N. Shribala
Department of ECE,
BRECW, Hyderabad, Telangana, India
Dr.P.Srihari
Department of ECE,
GCET, Hyderabad, Telangana, India
Dr.B.C.Jinaga
Department of ECE,
JNTUH, Hyderabad, Telangana, India
ABSTRACT
Cognitive radio network’s primary challenge is sensing of primary user
signal and efficiently handling the spectrum availability. Spectrum sensing is
the way ahead and vital for Dynamic Spectrum Access, where malicious users
deploy Spectrum Sensing Data Falsification (SSDF) attacks. This paper
discusses the technique to calculate the importance of using nodes for primary
as well as secondary users. It prevents spectrum problems to primary users
from Spectrum Sensing Data Falsification by secondary users and also shields
secondary users from unauthorized primary users. Simulation runs of the
novel approach using usual network conditions and SSDF attacks greatly
bought down the error rate of spectrum decision and at the same time
improved the detection rate of malicious cognitive nodes.
Key words: Cognitive Radio, Cooperative Spectrum Sensing, Data
falsification attack, Malicious User Detection, Spectrum sensing
Cite this Article: N.Shribala Dr.P.Srihari and Dr.B.C.Jinaga, Data
Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability
Verification, International Journal of Electronics and Communication
Engineering & Technology, 7(3), 2016, pp. 59–67.
http://www.iaeme.com/IJECET/issues.asp?JType=IJECET&VType=7&IType=3
N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga
http://www.iaeme.com/IJECET/index.asp 60 editor@iaeme.com
1. INTRODUCTION
Till date, predetermined spectrum bands are being allotted to service providers. This
approach resulted in unproductive spectrum consumption and as an alternative
cognitive radio networks was introduced. The network will allow cognitive radios,
labeled secondary unlicensed users (SUs) to choose the foremost licensed users or
primary users (PUs) bands when these bands are unoccupied by PUs. However the
SUs should vacate the band promptly following a Licensed User begins transmission
in the affiliated band [1]. Thus the main function of a cognitive radio is spectrum
sensing.
Spectrum sensing methods are mainly energy detection, cyclostationary feature
detection, and matched filter detection [2-4]. The functioning of spectrum sensing is
evaluated using probability of detection and probability of false alarm. Probability of
detection is the probability of confirming the occupancy of spectrum while the
licensed user is found. Probability of false alarm is the probability of confirming the
occupancy of spectrum while the licensed user has no broadcast. Among various
spectrum sensing strategies for easily determining the licensed spectrum reputation,
the energy detector method incurs quite a lower execution cost and as such is broadly
utilized. It serves as the optimum strategy to identify the signal carried by a primary
user whose place is obscure and also to realize the power of the obtained transmission
[6]. The trouble with this technique is that the obtained transmission power may be
significantly diminished at a specific geographic area because of multipath fading as
well as shadowing consequences [7]. In these conditions, it is complicated for a
secluded sensing device to differentiate around an idle band and faded one. To
conquer this issue, cooperative spectrum sensing techniques have been projected [5, 8,
9]. Anyhow, in cooperative sensing, because of imperfect network between a licensed
user and a secondary user (SU) or dishonest tendencies of a SU, a customer could
transmit false sensing outcome to the fusion hub. Thus, the efficiency of the method
degrades significantly. To conquer this concern, protected spectrum sensing become
suggested.
2. RELATED WORK
The concept of utilizing Beta Reputation System as reputation assessment system
projected in [10] is that a node’s capability in its spectrum sensing reputation is
exploited as a primary factor for computation of spectrum reports. The assumption
being made is that the Licensed User’s transmission range is sufficient to be obtained
by every node in the cognitive radio network (CRN) and the Secondary User base
station (SUBS), the controlling station of the CRN. It further assumes that the
Licensed User could interact with SUBS subjective to error reporting to the secondary
user base station about any impedance resulting from CRN procedure. As this
services considers that the Licensed User can't sell its unallocated spectrum bands,
hence generally there is no compensation for it to interact with the CRN. This
conversation could cost a Licensed User, extra hardware and/or system complexity,
merely just to notify the CRN about its communication interferences.
Spectrum sensing reports only in Licensed User’s coverage area should be
considered for spectrum decisions, and only those SUs prominence scores will be
updated. Moreover, the FCC stipulates, the CRN might use empty spectrum bands in
a non-interfering perspective eliminating the requirement of changes in Licensed
User. The work also does away with any mobility by SUs or PUs and proposes a
collaborative spectrum sensing strategy [11] taking into consideration Location
Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability
Verification
http://www.iaeme.com/IJECET/index.asp 61 editor@iaeme.com
Reliability and Malicious Intent as reliability criteria. The Dempster-Shafer concept
of validation to analyze reliability of revealing secondary user nodes is used in this
work. The projected strategy assigns reliability values to various cells in each network
that can acquire exceptional stages of Licensed User’s signal because of the
consequence of multi-path, signal diminishing and additional considerations in the
radio environment. Spectrum sensing reports from SUs using Equal Gain Combining
and trust values assigned to their cells are both given equal importance for data
aggregation.
Figure 1 Adhoc CRN with Malicious Nodes
This strategy is based upon the factor that Licensed User’s interaction range is
hugely adequate to be obtained by the whole CRN and utilizes the spectrum sensing
assessments of every CRN nodes to achieve the ultimate spectrum decision. Authors
in [12] and [13] base their strategy on the factor that the transmitting range of
Licensed User is significant adequately to be obtained in the whole CRN [12] and
offer pre-filtering all reports to eliminate drastic spectrum sensing reports and a
simple strategy to compute spectrum sensing decisions. [13] presents the spectrum
sensing issue as an M-ary hypotheses screening difficulty and proposes a cluster-
based CRN where cluster heads acquire, process raw spectrum sensing information
and send it to the fusion center.
Concluding the basis of both the approaches is on the fact that PUs transmission
range is large enough for every node in the network to access; both approaches have
no practical application for a CRN having a Licensed User with smaller transmission
range than the size of the CRN.
3. DATA FALSIFICATION LENIENT SECURE SPECTRUM
SENSING BY NODE RELIABILITY VERIFICATION
The reliability of spectrum sensing (CSS) can be severely degraded by the falsified
spectrum sensing reports provided by malicious secondary users (SUs). In regard to
this a novel prominence state verification strategy (PSV) was introduced in our earlier
work. It is proven to be significant to identify the reliable neighbor nodes towards
spectrum sensing. The constraint of that model is that it verifies only the reliability of
the responders (neighbor nodes involved in spectrum sensing) by assuming that the
supplicant (secondary user that is initiating spectrum sensing) nodes are not
malicious, but in reality this is not true. A node can attempt to seek the spectrum
N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga
http://www.iaeme.com/IJECET/index.asp 62 editor@iaeme.com
under malicious intention that it can infer the utilization of the spectrum by primary
user. This practice of attack on supplicant side would lead to severe interference
towards spectrum usage. The model devised here is intended to avoid the malicious
and selfish nodes from the act of spectrum sensing. A secondary user of CRN can
seek the response from its neighbor nodes under a malicious or selfish intention.
The possible attacks would be
 By knowing the busy state of the spectrum, can attempt for an interference attack
(malicious intention).
 By knowing the idle state of the spectrum, can engage that spectrum for future usage
(selfish intention)
The model devised in our earlier work verifies the reputation of the respondents
only. This verification is being enhanced such that any neighbor node verifies the
reputation state of the supplicant.
Reliability check technique is devoted to obtain the reliability through neighbors.
It executes a particular divergence test to offer the position with almost all the
processing neighbor secondary user position. Usual Deviance Test requires each and
every neighbor secondary user to authenticate accumulated reliability as well as its
solid reliability to attain a neighbor and avoid any oblique reliability that is isolated by
a specific quality A (the divergence roof). In Exclusive Divergence Test the outcome
is to obtain neighbor secondary user by focusing on the reliability of its neighbor
secondary user. The reliability of the neighbor nodes is checked and is concluded as
reliable if the value is greater than the threshold. This enables quick reliability
checking that is essential in our evaluated circumstances during which neighbor
secondary users don't get adequate time to notice the reliability of various neighbor
secondary users.
3.1. Assessing the Reliability of the Neighbor Secondary Users
A cognitive secondary user ssu, is a spectrum supplicant and nsu is the number of
neighbor secondary users to spectrum supplicant users ssu. The spectrum supplicant
measures the reliability of all its neighbor secondary users as shown in figure 2
Figure 2 Assessing Reliability of nodes
Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability
Verification
http://www.iaeme.com/IJECET/index.asp 63 editor@iaeme.com
The reliability score ratio of neighbor node is given by
rc
nni
rs
nni
nni
rsr 
(1)
The reliability state revision divergence ratio, which gives the discrepancy count
of secondary spectrum supplicants involved to generate reliability score rs is given by
rc
nni
rsudt
nni
nni
rsuds  (2)
The reliability score update frequency of the neighbor node inn is given by
rc
nni
rsu
nni
nni
rsuf  (3)
Where rc is the request count, rsu is the reliability update occurrence and rsudt is
reliability update discrepancy threshold.
The secondary spectrum supplicant ssu measures reliability score rss of each
neighbor node. Then supplicant node ssu considers the response from optimal
neighbor node towards spectrum sensing as secondary user. The optimal neighbor will
be selected based on their reliability score rs given by
nni
rsuf
nni
rsuds
nni
rsr
nni
rs  (4)
3.2. Updating Reliability score
Upon completion of the spectrum sensing process, the spectrum supplicant ssu revises
the reliability score of the neighbor secondary user i
nsu that involved in spectrum
sensing act of ssu. The spectrum supplicant ssu fixes the reliability of the neighbor
secondary user nsui
as -1, 0 or 1.
 If neighbor secondary user’s spectrum sensing act is efficient then reliability of the
nsui
will be revised as 1
insu
rs
insu
rs
 If neighbor secondary user’s spectrum sensing act is suspicious but not generated any
obstacles during the process of spectrum sensing then reliability of the nsui
will be
revised as 0
insu
rs
insu
rs

If neighbor secondary user’s spectrum sensing act is malicious and generated
obstacles during the process of spectrum sensing then reliability of the nsui
will be
revised as 1
insu
rs
insu
rs
Further the spectrum supplicant ssu sends the message to neighbor secondary user
nsui
, which is regarding reliability update and is acknowledged by a blindfold
approach. In the attack prevention model the verification is being enhanced by
checking the reliability of the supplicant.
The supplicant node that requires spectrum sensing information selects respondent
node with utmost reputation then the cognitive radio nodes estimates mutual trust by
N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga
http://www.iaeme.com/IJECET/index.asp 64 editor@iaeme.com
exchanging their reliability. The reliability of the supplicant nodes is determined by
the neighbor nodes. The most recent reliability score is given by the primary user
node that owns the spectrum used by the supplicant node as secondary user. Upon
finding the reliability is satisfactory the cognitive radio node sends the status of the
spectrum available. The score is updated by the primary nodes involved.
The reliability of the supplicant node ssu is measured as
rc
ssu
ruf
ssu
rc
ssu
rsudt
ssu
rc
ssu
rs
ssu
ssu
rs  (5)
Where ssurc represent the request count, ssursudt represent the reliability score
update divergence threshold and ssuruf represents the reliability update frequency.
4. EMPIRICAL STUDY BY SIMULATION
The aim of the simulations is to analyze the relevance of prominence state verification
towards handling the Spectrum Sensing Data Falsification attacks in Spectrum state
verification process. The network is considered with 200 numbers of nodes with
divergent number of malicious and selfish nodes that ranges from 2% to 20%. The
characteristics and attributes are illustrated in table1. The constraint that we didn’t
consider is the impact of location consistency of secondary user, which is assumed to
be stable and consistent. The explored results are significantly confirming the
advantage of the proposal. The impact of the proposal was verified by comparing with
our earlier model devised.
Table1 Parameters and their values range used in simulations
Number of secondary users Range 18 to 180
scope of network region 1720 m × 540 m
Radio spectrum’s least cope 258 m
Channel count 43
Radio Frequency Model(each) 7 rps
Maximal load per each transmission 0.9 KB
Load assortment range 256 to 512 kb per second
raw data transfer under physical link 2.5 Mb per second
The main purpose of this model is to analyze the relevance of Data Falsification
Lenient Secure Spectrum Sensing (DFL) over the previous model which verifies the
reliability of the neighbor nodes only. Parameters used are inference lenient ratio and
spectrum utilization ratio.
Figure (3) shows the interference free spectrum utilization vs percentage of
malicious secondary users. The results in table 2 indicate that the reliability
verification of the supplicant secondary users increases the avoidance of inference
during spectrum utilization by secondary users. The average covariance of the
inference free spectrum utilization ratio observed is 0.12, which can conclude as the
advantage of proposal towards inference lenient spectrum sensing.
Figure (4) maps DFL against our previous model in spectrum utilization ratio. The
results indicate the maximal utilization of the spectrum by secondary users. The
proposed intent inference lenient model maximized the spectrum utilization, which is
Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability
Verification
http://www.iaeme.com/IJECET/index.asp 65 editor@iaeme.com
due to significant avoidance of the selfish nodes as secondary users. The average
improved spectrum utilization ratio observed under proposed model is 0.341.
Figure 3 Interference Avoidance during Spectrum Sensing
The numerical values are tabulated in table 2.
Table 2 Comparison of PSASS and DFL with respect to Interference free spectrum utilization
Malicious
Nodes %
2 4 6 8 10 14 16 20
PSASSS 0.88 0.87 0.86 0.81 0.8 0.78 0.67 0.61
DFL 0.97 0.97 0.96 0.96 0.95 0.92 0.9 0.9
Figure 2 Spectrum Utilization Ratio
The numerical values are tabulated in table 3.
N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga
http://www.iaeme.com/IJECET/index.asp 66 editor@iaeme.com
Table 3 Comparison of PSASS and DFL with respect to Spectrum utilization ratio
Selfish
Nodes %
2 4 6 8 10 14 16 20
PSASSS 0.89 0.89 0.88 0.78 0.75 0.73 0.73 0.71
DFL 0.95 0.95 0.93 0.92 0.92 0.91 0.9 0.84
5. CONCLUSION
The proposed Data Falsification Intended Inference Lenient Secure Spectrum Sensing
strategy depends on decentralized reliability state verification of the neighbor nodes
which require information regarding spectrum available and also the nodes which
supply the information in cognitive radio networks. The cooperative or combined
CRN spectrum sensing perspective spreads a technique to the attackers who might
contradict the sensing outcomes. The determination of an attacker might be moreover
selfish or malicious. Simply being selfish, an attacker may update the occurrence of
the primary user if there is essentially none and abstain the cognitive users from using
the spectrum. Although being malicious, an assailant may report the absence of the
licensed user while there is one, hence making chaos and obstruction for primary and
secondary users. In this model the Reliability based secondary user concerned
Spectrum sensing technique is examined. The devised version is appreciable and
exceptional to assure spectrum sensing. The quantitative analysis done through
simulations indicates the devised model is scalable and robust towards handling the
malicious or selfish nodes in spectrum state verification strategy. The model devised
here in this paper is not considering factors such as signal fading due to urbanization,
contention in spectrum sensing, which can be playing significant role to influence the
nodes to send falsified spectrum sensing information. Hence in our further work these
factors will be considered in respondent selection and reliability state updating
strategy.
REFERENCES
[1] S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications,”
IEEE Journal on Selected Areas in Communications, Vol. 23, No. 2, 2005,
pp. 201-220.doi:10.1109/ JSAC.2004.839380.
[2] S. M. Kay, “Fundamentals of Statistical Signal Processing: Detection Theory,
“Prentice Hall, Upper Saddle River, 1998.
[3] H. V. Poor, “An Introduction to Signal Detection and Estimation,” Springer-
Verlag, New York, 1994.
[4] S.Enserink and D.Cochran, “A Cyclostationary Feature Detector,” Proceedings of
the 28th Asilomar Conference on Signals,Systems,and Computers, Pacific Grove,
31 October-2 November 1994, pp. 806-810. doi:10.1109/ACSSC.1994.471573.
[5] P. Kaligineedi, M. Khabbazian and V. K. Bhargava, “Secure Cooperative Sensing
Techniques for Cognitive Radio System,” IEEE International Conference on
Communications, Beijing, 19-23 May 2008, pp. 3406-3410.
Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability
Verification
http://www.iaeme.com/IJECET/index.asp 67 editor@iaeme.com
[6] B. Shen and K. S. Kwak, “Soft Combination Schemes for Cooperative Spectrum
Sensing in Cognitive Radio Networks,” ETRI Journal, Vol. 31, No. 3, 2009, pp.
263-270. doi:10.4218/ etrij.09.0108.0501.
[7] D. Cabric, S. M. Mishra and R. W. Brodersen, “Implementation Issues in
Spectrum Sensing for Cognitive Radios,” Proceedings of 38th Asilomar
Conference on Signals, Systems, Computers, Pacific Grove, 7-10 November
2004, pp. 772-776.
[8] R. L. Chen, J.-M. Park and K. G. Bian, “Robust Distributed Spectrum Sensing in
Cognitive Radio Networks,” Proceedings of the 27th Annual IEEE Conference
on Computer Communications, Phoenix, 13-18 April 2008, pp. 1876-1884.
[9] K. J. Peng and Z. H. Tsai, “A Distributed Spectrum Sensing Scheme Based on
Credibility and Evidence Theory in Cognitive Radio,” Proceedings of the 17th
IEEE International Symposium on Personal, Indoor and Mobile Radio
Communications, Helsinki, 11-14 September 2006, pp. 1-5.
doi:10.1109/PIMRC.2006.254089.
[10] Qin, T., et al., “Towards a trust aware cognitive radio architecture,” SIGMOBILE
Mobile Computational Communication Reviews 2009, pp. 86–95.
[11] Jana, S., et al., “Trusted collaborative spectrum sensing for mobile cognitive
radio networks,” 32nd IEEE International Conference on Computer
Communications, INFOCOM 2012.
[12] P. Kaligineedi., et al., “Secure Cooperative Sensing Techniques for Cognitive
Radio Systems”, International Conference on Communications, ICC 2008.
[13] Jin Wei., et al., "Two-Tier Optimal-Cooperation Based Secure Distributed
[14] Spectrum Sensing for Wireless Cognitive Radio Networks," IEEE INFOCOM
2010.
[15] Qin, T., et al., “Towards a trust aware cognitive radio architecture,” SIGMOBILE
Mobile Computational Communication Reviews 2009, pp. 86–95.
[16] http://www.ijcsit.com/docs/Volume%205/vol5issue03/ijcsit20140503453.pdf

More Related Content

What's hot

Maximize resource utilization based channel access model with presence of re...
Maximize resource utilization based channel access model  with presence of re...Maximize resource utilization based channel access model  with presence of re...
Maximize resource utilization based channel access model with presence of re...
IJECEIAES
 
Performance evaluation of various cooperative spectrum sensing algorithms for...
Performance evaluation of various cooperative spectrum sensing algorithms for...Performance evaluation of various cooperative spectrum sensing algorithms for...
Performance evaluation of various cooperative spectrum sensing algorithms for...
eSAT Publishing House
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
ijiert bestjournal
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
eSAT Journals
 
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKS
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKSSPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKS
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKS
IJCNC Journal
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio
IJECEIAES
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
Editor IJMTER
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
IJEEE
 
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
IAEME Publication
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
Aarthi Raghavendra
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
Editor IJCATR
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
ijwmn
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
IRJET Journal
 
OFDM Based Cognitive radio
OFDM Based Cognitive radioOFDM Based Cognitive radio
OFDM Based Cognitive radio
Deepesh Sinnya
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
Ijcnc050202
Ijcnc050202Ijcnc050202
Ijcnc050202
IJCNCJournal
 
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
IJMER
 

What's hot (19)

Maximize resource utilization based channel access model with presence of re...
Maximize resource utilization based channel access model  with presence of re...Maximize resource utilization based channel access model  with presence of re...
Maximize resource utilization based channel access model with presence of re...
 
Performance evaluation of various cooperative spectrum sensing algorithms for...
Performance evaluation of various cooperative spectrum sensing algorithms for...Performance evaluation of various cooperative spectrum sensing algorithms for...
Performance evaluation of various cooperative spectrum sensing algorithms for...
 
report
reportreport
report
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKS
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKSSPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKS
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKS
 
Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio Hybrid Spectrum Sensing Method for Cognitive Radio
Hybrid Spectrum Sensing Method for Cognitive Radio
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
 
OFDM Based Cognitive radio
OFDM Based Cognitive radioOFDM Based Cognitive radio
OFDM Based Cognitive radio
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Ijcnc050202
Ijcnc050202Ijcnc050202
Ijcnc050202
 
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...
 

Similar to DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABILITY VERIFICATION

Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Saroj Dhakal
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
ijwmn
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
ijwmn
 
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
IJASRD Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
IJERA Editor
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
IJERA Editor
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
eSAT Publishing House
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
eSAT Journals
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
ijngnjournal
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET Journal
 
Collaborative cyclostationary spectrum sensing for cognitive radio systems
Collaborative cyclostationary spectrum sensing for cognitive radio systemsCollaborative cyclostationary spectrum sensing for cognitive radio systems
Collaborative cyclostationary spectrum sensing for cognitive radio systems
kareenavolt
 
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
IRJET Journal
 
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
IRJET Journal
 
Multiple Group Handling Cognitive Radio Network With High Accuracy
Multiple Group Handling Cognitive Radio Network With High AccuracyMultiple Group Handling Cognitive Radio Network With High Accuracy
Multiple Group Handling Cognitive Radio Network With High Accuracy
IRJET Journal
 
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio NetworksSensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
IRJET Journal
 
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
A Mathematical Approach for Hidden Node Problem in Cognitive Radio NetworksA Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
TELKOMNIKA JOURNAL
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
Alexander Decker
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
IIRindia
 
C0511318
C0511318C0511318
C0511318
IOSR Journals
 

Similar to DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABILITY VERIFICATION (20)

Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive RadioSpectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
Spectrum Sensing using Cooperative Energy Detection Method for Cognitive Radio
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...
 
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
 
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
IRJET- Dynamic Spectrum Sensing using Matched Filter Method and MATLAB Simula...
 
Collaborative cyclostationary spectrum sensing for cognitive radio systems
Collaborative cyclostationary spectrum sensing for cognitive radio systemsCollaborative cyclostationary spectrum sensing for cognitive radio systems
Collaborative cyclostationary spectrum sensing for cognitive radio systems
 
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
 
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
 
Multiple Group Handling Cognitive Radio Network With High Accuracy
Multiple Group Handling Cognitive Radio Network With High AccuracyMultiple Group Handling Cognitive Radio Network With High Accuracy
Multiple Group Handling Cognitive Radio Network With High Accuracy
 
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio NetworksSensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
Sensing of Spectrum for SC-FDMA Signals in Cognitive Radio Networks
 
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
A Mathematical Approach for Hidden Node Problem in Cognitive Radio NetworksA Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
A Mathematical Approach for Hidden Node Problem in Cognitive Radio Networks
 
A review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networksA review paper based on spectrum sensing techniques in cognitive radio networks
A review paper based on spectrum sensing techniques in cognitive radio networks
 
V5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.docV5_I1_2016_Paper19.doc
V5_I1_2016_Paper19.doc
 
C0511318
C0511318C0511318
C0511318
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 

DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABILITY VERIFICATION

  • 1. http://www.iaeme.com/IJECET/index.asp 59 editor@iaeme.com International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 3, May–June 2016, pp. 59–67, Article ID: IJECET_07_03_008 Available online at http://www.iaeme.com/IJECET/issues.asp?JType=IJECET&VType=7&IType=3 Journal Impact Factor (2016): 8.2691 (Calculated by GISI) www.jifactor.com ISSN Print: 0976-6464 and ISSN Online: 0976-6472 © IAEME Publication DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABILITY VERIFICATION N. Shribala Department of ECE, BRECW, Hyderabad, Telangana, India Dr.P.Srihari Department of ECE, GCET, Hyderabad, Telangana, India Dr.B.C.Jinaga Department of ECE, JNTUH, Hyderabad, Telangana, India ABSTRACT Cognitive radio network’s primary challenge is sensing of primary user signal and efficiently handling the spectrum availability. Spectrum sensing is the way ahead and vital for Dynamic Spectrum Access, where malicious users deploy Spectrum Sensing Data Falsification (SSDF) attacks. This paper discusses the technique to calculate the importance of using nodes for primary as well as secondary users. It prevents spectrum problems to primary users from Spectrum Sensing Data Falsification by secondary users and also shields secondary users from unauthorized primary users. Simulation runs of the novel approach using usual network conditions and SSDF attacks greatly bought down the error rate of spectrum decision and at the same time improved the detection rate of malicious cognitive nodes. Key words: Cognitive Radio, Cooperative Spectrum Sensing, Data falsification attack, Malicious User Detection, Spectrum sensing Cite this Article: N.Shribala Dr.P.Srihari and Dr.B.C.Jinaga, Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability Verification, International Journal of Electronics and Communication Engineering & Technology, 7(3), 2016, pp. 59–67. http://www.iaeme.com/IJECET/issues.asp?JType=IJECET&VType=7&IType=3
  • 2. N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga http://www.iaeme.com/IJECET/index.asp 60 editor@iaeme.com 1. INTRODUCTION Till date, predetermined spectrum bands are being allotted to service providers. This approach resulted in unproductive spectrum consumption and as an alternative cognitive radio networks was introduced. The network will allow cognitive radios, labeled secondary unlicensed users (SUs) to choose the foremost licensed users or primary users (PUs) bands when these bands are unoccupied by PUs. However the SUs should vacate the band promptly following a Licensed User begins transmission in the affiliated band [1]. Thus the main function of a cognitive radio is spectrum sensing. Spectrum sensing methods are mainly energy detection, cyclostationary feature detection, and matched filter detection [2-4]. The functioning of spectrum sensing is evaluated using probability of detection and probability of false alarm. Probability of detection is the probability of confirming the occupancy of spectrum while the licensed user is found. Probability of false alarm is the probability of confirming the occupancy of spectrum while the licensed user has no broadcast. Among various spectrum sensing strategies for easily determining the licensed spectrum reputation, the energy detector method incurs quite a lower execution cost and as such is broadly utilized. It serves as the optimum strategy to identify the signal carried by a primary user whose place is obscure and also to realize the power of the obtained transmission [6]. The trouble with this technique is that the obtained transmission power may be significantly diminished at a specific geographic area because of multipath fading as well as shadowing consequences [7]. In these conditions, it is complicated for a secluded sensing device to differentiate around an idle band and faded one. To conquer this issue, cooperative spectrum sensing techniques have been projected [5, 8, 9]. Anyhow, in cooperative sensing, because of imperfect network between a licensed user and a secondary user (SU) or dishonest tendencies of a SU, a customer could transmit false sensing outcome to the fusion hub. Thus, the efficiency of the method degrades significantly. To conquer this concern, protected spectrum sensing become suggested. 2. RELATED WORK The concept of utilizing Beta Reputation System as reputation assessment system projected in [10] is that a node’s capability in its spectrum sensing reputation is exploited as a primary factor for computation of spectrum reports. The assumption being made is that the Licensed User’s transmission range is sufficient to be obtained by every node in the cognitive radio network (CRN) and the Secondary User base station (SUBS), the controlling station of the CRN. It further assumes that the Licensed User could interact with SUBS subjective to error reporting to the secondary user base station about any impedance resulting from CRN procedure. As this services considers that the Licensed User can't sell its unallocated spectrum bands, hence generally there is no compensation for it to interact with the CRN. This conversation could cost a Licensed User, extra hardware and/or system complexity, merely just to notify the CRN about its communication interferences. Spectrum sensing reports only in Licensed User’s coverage area should be considered for spectrum decisions, and only those SUs prominence scores will be updated. Moreover, the FCC stipulates, the CRN might use empty spectrum bands in a non-interfering perspective eliminating the requirement of changes in Licensed User. The work also does away with any mobility by SUs or PUs and proposes a collaborative spectrum sensing strategy [11] taking into consideration Location
  • 3. Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability Verification http://www.iaeme.com/IJECET/index.asp 61 editor@iaeme.com Reliability and Malicious Intent as reliability criteria. The Dempster-Shafer concept of validation to analyze reliability of revealing secondary user nodes is used in this work. The projected strategy assigns reliability values to various cells in each network that can acquire exceptional stages of Licensed User’s signal because of the consequence of multi-path, signal diminishing and additional considerations in the radio environment. Spectrum sensing reports from SUs using Equal Gain Combining and trust values assigned to their cells are both given equal importance for data aggregation. Figure 1 Adhoc CRN with Malicious Nodes This strategy is based upon the factor that Licensed User’s interaction range is hugely adequate to be obtained by the whole CRN and utilizes the spectrum sensing assessments of every CRN nodes to achieve the ultimate spectrum decision. Authors in [12] and [13] base their strategy on the factor that the transmitting range of Licensed User is significant adequately to be obtained in the whole CRN [12] and offer pre-filtering all reports to eliminate drastic spectrum sensing reports and a simple strategy to compute spectrum sensing decisions. [13] presents the spectrum sensing issue as an M-ary hypotheses screening difficulty and proposes a cluster- based CRN where cluster heads acquire, process raw spectrum sensing information and send it to the fusion center. Concluding the basis of both the approaches is on the fact that PUs transmission range is large enough for every node in the network to access; both approaches have no practical application for a CRN having a Licensed User with smaller transmission range than the size of the CRN. 3. DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY NODE RELIABILITY VERIFICATION The reliability of spectrum sensing (CSS) can be severely degraded by the falsified spectrum sensing reports provided by malicious secondary users (SUs). In regard to this a novel prominence state verification strategy (PSV) was introduced in our earlier work. It is proven to be significant to identify the reliable neighbor nodes towards spectrum sensing. The constraint of that model is that it verifies only the reliability of the responders (neighbor nodes involved in spectrum sensing) by assuming that the supplicant (secondary user that is initiating spectrum sensing) nodes are not malicious, but in reality this is not true. A node can attempt to seek the spectrum
  • 4. N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga http://www.iaeme.com/IJECET/index.asp 62 editor@iaeme.com under malicious intention that it can infer the utilization of the spectrum by primary user. This practice of attack on supplicant side would lead to severe interference towards spectrum usage. The model devised here is intended to avoid the malicious and selfish nodes from the act of spectrum sensing. A secondary user of CRN can seek the response from its neighbor nodes under a malicious or selfish intention. The possible attacks would be  By knowing the busy state of the spectrum, can attempt for an interference attack (malicious intention).  By knowing the idle state of the spectrum, can engage that spectrum for future usage (selfish intention) The model devised in our earlier work verifies the reputation of the respondents only. This verification is being enhanced such that any neighbor node verifies the reputation state of the supplicant. Reliability check technique is devoted to obtain the reliability through neighbors. It executes a particular divergence test to offer the position with almost all the processing neighbor secondary user position. Usual Deviance Test requires each and every neighbor secondary user to authenticate accumulated reliability as well as its solid reliability to attain a neighbor and avoid any oblique reliability that is isolated by a specific quality A (the divergence roof). In Exclusive Divergence Test the outcome is to obtain neighbor secondary user by focusing on the reliability of its neighbor secondary user. The reliability of the neighbor nodes is checked and is concluded as reliable if the value is greater than the threshold. This enables quick reliability checking that is essential in our evaluated circumstances during which neighbor secondary users don't get adequate time to notice the reliability of various neighbor secondary users. 3.1. Assessing the Reliability of the Neighbor Secondary Users A cognitive secondary user ssu, is a spectrum supplicant and nsu is the number of neighbor secondary users to spectrum supplicant users ssu. The spectrum supplicant measures the reliability of all its neighbor secondary users as shown in figure 2 Figure 2 Assessing Reliability of nodes
  • 5. Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability Verification http://www.iaeme.com/IJECET/index.asp 63 editor@iaeme.com The reliability score ratio of neighbor node is given by rc nni rs nni nni rsr  (1) The reliability state revision divergence ratio, which gives the discrepancy count of secondary spectrum supplicants involved to generate reliability score rs is given by rc nni rsudt nni nni rsuds  (2) The reliability score update frequency of the neighbor node inn is given by rc nni rsu nni nni rsuf  (3) Where rc is the request count, rsu is the reliability update occurrence and rsudt is reliability update discrepancy threshold. The secondary spectrum supplicant ssu measures reliability score rss of each neighbor node. Then supplicant node ssu considers the response from optimal neighbor node towards spectrum sensing as secondary user. The optimal neighbor will be selected based on their reliability score rs given by nni rsuf nni rsuds nni rsr nni rs  (4) 3.2. Updating Reliability score Upon completion of the spectrum sensing process, the spectrum supplicant ssu revises the reliability score of the neighbor secondary user i nsu that involved in spectrum sensing act of ssu. The spectrum supplicant ssu fixes the reliability of the neighbor secondary user nsui as -1, 0 or 1.  If neighbor secondary user’s spectrum sensing act is efficient then reliability of the nsui will be revised as 1 insu rs insu rs  If neighbor secondary user’s spectrum sensing act is suspicious but not generated any obstacles during the process of spectrum sensing then reliability of the nsui will be revised as 0 insu rs insu rs  If neighbor secondary user’s spectrum sensing act is malicious and generated obstacles during the process of spectrum sensing then reliability of the nsui will be revised as 1 insu rs insu rs Further the spectrum supplicant ssu sends the message to neighbor secondary user nsui , which is regarding reliability update and is acknowledged by a blindfold approach. In the attack prevention model the verification is being enhanced by checking the reliability of the supplicant. The supplicant node that requires spectrum sensing information selects respondent node with utmost reputation then the cognitive radio nodes estimates mutual trust by
  • 6. N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga http://www.iaeme.com/IJECET/index.asp 64 editor@iaeme.com exchanging their reliability. The reliability of the supplicant nodes is determined by the neighbor nodes. The most recent reliability score is given by the primary user node that owns the spectrum used by the supplicant node as secondary user. Upon finding the reliability is satisfactory the cognitive radio node sends the status of the spectrum available. The score is updated by the primary nodes involved. The reliability of the supplicant node ssu is measured as rc ssu ruf ssu rc ssu rsudt ssu rc ssu rs ssu ssu rs  (5) Where ssurc represent the request count, ssursudt represent the reliability score update divergence threshold and ssuruf represents the reliability update frequency. 4. EMPIRICAL STUDY BY SIMULATION The aim of the simulations is to analyze the relevance of prominence state verification towards handling the Spectrum Sensing Data Falsification attacks in Spectrum state verification process. The network is considered with 200 numbers of nodes with divergent number of malicious and selfish nodes that ranges from 2% to 20%. The characteristics and attributes are illustrated in table1. The constraint that we didn’t consider is the impact of location consistency of secondary user, which is assumed to be stable and consistent. The explored results are significantly confirming the advantage of the proposal. The impact of the proposal was verified by comparing with our earlier model devised. Table1 Parameters and their values range used in simulations Number of secondary users Range 18 to 180 scope of network region 1720 m × 540 m Radio spectrum’s least cope 258 m Channel count 43 Radio Frequency Model(each) 7 rps Maximal load per each transmission 0.9 KB Load assortment range 256 to 512 kb per second raw data transfer under physical link 2.5 Mb per second The main purpose of this model is to analyze the relevance of Data Falsification Lenient Secure Spectrum Sensing (DFL) over the previous model which verifies the reliability of the neighbor nodes only. Parameters used are inference lenient ratio and spectrum utilization ratio. Figure (3) shows the interference free spectrum utilization vs percentage of malicious secondary users. The results in table 2 indicate that the reliability verification of the supplicant secondary users increases the avoidance of inference during spectrum utilization by secondary users. The average covariance of the inference free spectrum utilization ratio observed is 0.12, which can conclude as the advantage of proposal towards inference lenient spectrum sensing. Figure (4) maps DFL against our previous model in spectrum utilization ratio. The results indicate the maximal utilization of the spectrum by secondary users. The proposed intent inference lenient model maximized the spectrum utilization, which is
  • 7. Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability Verification http://www.iaeme.com/IJECET/index.asp 65 editor@iaeme.com due to significant avoidance of the selfish nodes as secondary users. The average improved spectrum utilization ratio observed under proposed model is 0.341. Figure 3 Interference Avoidance during Spectrum Sensing The numerical values are tabulated in table 2. Table 2 Comparison of PSASS and DFL with respect to Interference free spectrum utilization Malicious Nodes % 2 4 6 8 10 14 16 20 PSASSS 0.88 0.87 0.86 0.81 0.8 0.78 0.67 0.61 DFL 0.97 0.97 0.96 0.96 0.95 0.92 0.9 0.9 Figure 2 Spectrum Utilization Ratio The numerical values are tabulated in table 3.
  • 8. N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga http://www.iaeme.com/IJECET/index.asp 66 editor@iaeme.com Table 3 Comparison of PSASS and DFL with respect to Spectrum utilization ratio Selfish Nodes % 2 4 6 8 10 14 16 20 PSASSS 0.89 0.89 0.88 0.78 0.75 0.73 0.73 0.71 DFL 0.95 0.95 0.93 0.92 0.92 0.91 0.9 0.84 5. CONCLUSION The proposed Data Falsification Intended Inference Lenient Secure Spectrum Sensing strategy depends on decentralized reliability state verification of the neighbor nodes which require information regarding spectrum available and also the nodes which supply the information in cognitive radio networks. The cooperative or combined CRN spectrum sensing perspective spreads a technique to the attackers who might contradict the sensing outcomes. The determination of an attacker might be moreover selfish or malicious. Simply being selfish, an attacker may update the occurrence of the primary user if there is essentially none and abstain the cognitive users from using the spectrum. Although being malicious, an assailant may report the absence of the licensed user while there is one, hence making chaos and obstruction for primary and secondary users. In this model the Reliability based secondary user concerned Spectrum sensing technique is examined. The devised version is appreciable and exceptional to assure spectrum sensing. The quantitative analysis done through simulations indicates the devised model is scalable and robust towards handling the malicious or selfish nodes in spectrum state verification strategy. The model devised here in this paper is not considering factors such as signal fading due to urbanization, contention in spectrum sensing, which can be playing significant role to influence the nodes to send falsified spectrum sensing information. Hence in our further work these factors will be considered in respondent selection and reliability state updating strategy. REFERENCES [1] S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications,” IEEE Journal on Selected Areas in Communications, Vol. 23, No. 2, 2005, pp. 201-220.doi:10.1109/ JSAC.2004.839380. [2] S. M. Kay, “Fundamentals of Statistical Signal Processing: Detection Theory, “Prentice Hall, Upper Saddle River, 1998. [3] H. V. Poor, “An Introduction to Signal Detection and Estimation,” Springer- Verlag, New York, 1994. [4] S.Enserink and D.Cochran, “A Cyclostationary Feature Detector,” Proceedings of the 28th Asilomar Conference on Signals,Systems,and Computers, Pacific Grove, 31 October-2 November 1994, pp. 806-810. doi:10.1109/ACSSC.1994.471573. [5] P. Kaligineedi, M. Khabbazian and V. K. Bhargava, “Secure Cooperative Sensing Techniques for Cognitive Radio System,” IEEE International Conference on Communications, Beijing, 19-23 May 2008, pp. 3406-3410.
  • 9. Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability Verification http://www.iaeme.com/IJECET/index.asp 67 editor@iaeme.com [6] B. Shen and K. S. Kwak, “Soft Combination Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks,” ETRI Journal, Vol. 31, No. 3, 2009, pp. 263-270. doi:10.4218/ etrij.09.0108.0501. [7] D. Cabric, S. M. Mishra and R. W. Brodersen, “Implementation Issues in Spectrum Sensing for Cognitive Radios,” Proceedings of 38th Asilomar Conference on Signals, Systems, Computers, Pacific Grove, 7-10 November 2004, pp. 772-776. [8] R. L. Chen, J.-M. Park and K. G. Bian, “Robust Distributed Spectrum Sensing in Cognitive Radio Networks,” Proceedings of the 27th Annual IEEE Conference on Computer Communications, Phoenix, 13-18 April 2008, pp. 1876-1884. [9] K. J. Peng and Z. H. Tsai, “A Distributed Spectrum Sensing Scheme Based on Credibility and Evidence Theory in Cognitive Radio,” Proceedings of the 17th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, 11-14 September 2006, pp. 1-5. doi:10.1109/PIMRC.2006.254089. [10] Qin, T., et al., “Towards a trust aware cognitive radio architecture,” SIGMOBILE Mobile Computational Communication Reviews 2009, pp. 86–95. [11] Jana, S., et al., “Trusted collaborative spectrum sensing for mobile cognitive radio networks,” 32nd IEEE International Conference on Computer Communications, INFOCOM 2012. [12] P. Kaligineedi., et al., “Secure Cooperative Sensing Techniques for Cognitive Radio Systems”, International Conference on Communications, ICC 2008. [13] Jin Wei., et al., "Two-Tier Optimal-Cooperation Based Secure Distributed [14] Spectrum Sensing for Wireless Cognitive Radio Networks," IEEE INFOCOM 2010. [15] Qin, T., et al., “Towards a trust aware cognitive radio architecture,” SIGMOBILE Mobile Computational Communication Reviews 2009, pp. 86–95. [16] http://www.ijcsit.com/docs/Volume%205/vol5issue03/ijcsit20140503453.pdf