SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @
SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE
RADIO NETWORK WITH SENSING STRATEGIES
1
Student,
Communication world is growing day by day In wire
cognitive radio network its name as CRN. In CRN Un
user this help to improve the spectrum efficiency as well generate a problem like some malicious or fake users can used the channel
and hamper the communication. So in this paper we discuss on security threats and technique to find them with sensing strategies
Keywords: Cognitive radio network, Pus, SUs,
--------------------------------------------------------------------
1. INTRODUCTION
Communication is a process of transmitting information from
one place to another through the medium information sends in
the form of electromagnetic waves through the medium air.
Here we see the advances in wireless communication.
Cognitive radio network is advancement in wireless
communication cognitive means sharing, in Cognitive rad
network Un-authorized user can used empty channel from the
spectrum band of authorized user. Cognitive Radio
(CRNs) is an intelligent network that adapt to changes in their
network to make a better use of the spectrum. CRNs solve the
spectrum shortage problem by allowing unlicensed users to
use spectrum band of licensed user without
generally authorized or licensed users known as primary users
and un-authorized or un-licensed users known as secondary
users. When data or information send by authorized or
primary user here primary user not used total band some of
them are free these empty channels are allowed to used by un
authorized or secondary users .Secondary
observe the activities of primary user, and when
secondary user detect the empty channel and occupy the
channel without disturbing the primary user. When the
primary users are sending information or it is active, the
secondary user should either avoid using the channel. An
Empty channel also known as spectrum holes. A spectrum
hole is a band of frequencies assigned to a primary user, but at
a particular time and specific geographic location, the band
is not being utilized by that user. [2].Figure-
structure of cognitive radio network. In this secondary user
occupy the space called white space of primary user
band which is under-utilized. Normally primary user has
own communication area, in which secondary user utilized the
empty channel without any interference.
arch in Engineering and Technology eISSN: 2319
_______________________________________________________________________________________
2014, Available @ http://www.ijret.org
SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE
RADIO NETWORK WITH SENSING STRATEGIES
Sandeep Thakre1
, Shruti Dixit2
tudent, 2
Professor, EC, SIRT, RGPV, Bhopal, MP, India
Abstract
ommunication world is growing day by day In wireless communication system introduces a new technology which I known as
cognitive radio network its name as CRN. In CRN Un-authorized user can used empty channel from the spectrum band of authorized
spectrum efficiency as well generate a problem like some malicious or fake users can used the channel
o in this paper we discuss on security threats and technique to find them with sensing strategies
Pus, SUs, Spectrum sensing, spectrum holes
--------------------------------------------------------------------***----------------------------------------------------------------------
Communication is a process of transmitting information from
through the medium information sends in
the form of electromagnetic waves through the medium air.
the advances in wireless communication.
Cognitive radio network is advancement in wireless
communication cognitive means sharing, in Cognitive radio
authorized user can used empty channel from the
spectrum band of authorized user. Cognitive Radio Networks
that adapt to changes in their
network to make a better use of the spectrum. CRNs solve the
spectrum shortage problem by allowing unlicensed users to
without interference,
or licensed users known as primary users
licensed users known as secondary
. When data or information send by authorized or
primary user here primary user not used total band some of
them are free these empty channels are allowed to used by un-
.Secondary users always
observe the activities of primary user, and when
secondary user detect the empty channel and occupy the
channel without disturbing the primary user. When the
primary users are sending information or it is active, the
y user should either avoid using the channel. An
Empty channel also known as spectrum holes. A spectrum
hole is a band of frequencies assigned to a primary user, but at
a particular time and specific geographic location, the band
-1 shows the basic
structure of cognitive radio network. In this secondary user
occupy the space called white space of primary user
utilized. Normally primary user has
in which secondary user utilized the
1.1 Basic Cognitive Radio Network
Fig.1 Basic cognitive radio network
Figure-1 shows the architecture of
When a primary user (PU) transmits data
licensed spectrum band, it may be possible t
channels of spectrum other channels are empty
channels are sensed by secondary user (SU) which has no
license for using this spectrum. Firstly secondary users sensed
the spectrum andsend the information of spectrum holes to the
SU’s. SU analyses the spectrum that PU ever uses these
channels or not, because sometime PU us
channels which they not use before operation. After
spectrum analysis SU’s decide how
required to send their data signal
1.2 Spectrum Sensing Technique
It is very important in Cognitive radio network that secondary
user properly sense the empty spectrum band. In this paper we
use energy sensing technique.
bit sequences of primary and secondary user.
eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
34
SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE
RADIO NETWORK WITH SENSING STRATEGIES
, Bhopal, MP, India
introduces a new technology which I known as
authorized user can used empty channel from the spectrum band of authorized
spectrum efficiency as well generate a problem like some malicious or fake users can used the channel
o in this paper we discuss on security threats and technique to find them with sensing strategies.
----------------------------------------------------------------------
Basic Cognitive Radio Network
Basic cognitive radio network
shows the architecture of cognitive radio cycle.
When a primary user (PU) transmits data signal from a
licensed spectrum band, it may be possible that it use only few
other channels are empty. These empty
channels are sensed by secondary user (SU) which has no
license for using this spectrum. Firstly secondary users sensed
information of spectrum holes to the
SU’s. SU analyses the spectrum that PU ever uses these
channels or not, because sometime PU use the empty
not use before operation. After
SU’s decide how many channels they
required to send their data signal
ctrum Sensing Technique
It is very important in Cognitive radio network that secondary
user properly sense the empty spectrum band. In this paper we
use energy sensing technique. But first look into the original
bit sequences of primary and secondary user.
IJRET: International Journal of Research in Engineering and Technology
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @
Fig-2 Original bit sequence of primary user
Figure23 shows bit sequence of primary user , whose data is
send in the form of bits, but there is some holes as shown in
figure as a gap in between two BPSK modulated signals. This
signal gaps is nothing but an empty channels or spectrum
holes.
Fig 3 Original bit sequence of Secondary User
In figure 3 shows bit sequence of secondary user, we use
Energy spectrum technique and find the spectrum holes or
empty channel without interfering or disturbing the licensed
user or primary user. In this Energy Spectrum Sensing
techniques, secondary user or un-licensed user analyze the
channel whether the channel have some data packets or not,
if its energy level is zero then they decided that the spectrum
is empty, and SU’s easily send their data to the desired
receiver.
2. THREATS OF COGNITIVE RADIO
2.1 PUEs or Primary User Emulsion Attack:
Primary user emulsion attack means when primary user send
data secondary user continuously monitor the channel
primary sends data it means channel busy,
this by using energy spectrum sensing technique
not send continuously When it is ideal or not busy
secondary sense channel and send data but when primary
requires channel then sold the control. But if somewhere else
arch in Engineering and Technology eISSN: 2319
_______________________________________________________________________________________
2014, Available @ http://www.ijret.org
al bit sequence of primary user
3 shows bit sequence of primary user , whose data is
send in the form of bits, but there is some holes as shown in
as a gap in between two BPSK modulated signals. This
signal gaps is nothing but an empty channels or spectrum
Original bit sequence of Secondary User
shows bit sequence of secondary user, we use
Energy spectrum technique and find the spectrum holes or
empty channel without interfering or disturbing the licensed
user or primary user. In this Energy Spectrum Sensing
licensed user analyze the
channel whether the channel have some data packets or not,
if its energy level is zero then they decided that the spectrum
is empty, and SU’s easily send their data to the desired
. THREATS OF COGNITIVE RADIO NETWORK
PUEs or Primary User Emulsion Attack:
Primary user emulsion attack means when primary user send
data secondary user continuously monitor the channel. When
secondary knows
sensing technique but primary
hen it is ideal or not busy state
secondary sense channel and send data but when primary
ut if somewhere else
malicious or fake secondary user work as primary an
control of channel and secondary send data at same time
malicious user behaves as primary so secondary sold control
and not send data such attack referred as primary user
emulsion attack.Additional fake or malicious secondary
users, may use a primary user emulation attacks to take
advantage of the secondary user's ability to avoid primary
users and cause excessive and unexpected dis
communications.[10] A fundamental characteristic of a CR is
its ability for spectrum sensing,
an opportunistic manner. This means that the CR has to
vacate a currently used spectrum band if an incumbent
signal is detected. In this case, CR’s perform spectrum hand
off seeking for different spectrum
Performing spectrum hand
degradation of the CR performance since more time for
sensing of the spectrum is required, and this decreases the
available time for accessing the spectrum.[3
Figure 4&5 shows Primary User Signals
Signals for Primary User Emulsion Attack in Cognitive Radio
eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
35
malicious or fake secondary user work as primary and wants
control of channel and secondary send data at same time
malicious user behaves as primary so secondary sold control
and not send data such attack referred as primary user
Additional fake or malicious secondary
primary user emulation attacks to take
advantage of the secondary user's ability to avoid primary
users and cause excessive and unexpected disruptions to
] A fundamental characteristic of a CR is
its ability for spectrum sensing, as it shall use the spectrum in
an opportunistic manner. This means that the CR has to
vacate a currently used spectrum band if an incumbent
signal is detected. In this case, CR’s perform spectrum hand-
off seeking for different spectrum holes for transmissions.
Performing spectrum hand-off very often results in
degradation of the CR performance since more time for
sensing of the spectrum is required, and this decreases the
e for accessing the spectrum.[3]
Fig4
Fig5
shows Primary User Signals and Secondary User
for Primary User Emulsion Attack in Cognitive Radio
IJRET: International Journal of Research in Engineering and Technology
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @
Network. This figure shows 18000 samples for the simulation
with 2 BPSK.
Fig 6
This figure 6 shows the Bit error rate reduced continuously
when Primary User Emulsion Attack occurred in network.
CONCLUSIONS
Through this paper, we practically find the
wireless communication environment and sense
spectrum band through Energy sensing techn
the practical approach of a secondary user
empty channel and send their data packets wi
the authorized user. In this wework on two types of threats
like primary user emulation attack and jamming attack .These
two are the major threats of cognitive radio network
communication environment. Jamming is the common attack
of wireless communication. It is similar to
(DoS) attack. In future we willimprove the work on cognitive
radio network and try to practically work on the security of
threats
REFERENCES
[1]. F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “A survey
on spectrum Management in Cognitive Radio Networks,”
IEEE Communications Magazine, April 2008.
[2]. Chetan N. Mathur, K.P. Subhalakshami, “Security issues
in cognitive radio netwroks,” Cognitive netw
Self-Aware Networks, 2007.
[3]. X. Zhang, C. Li, “Constructing secure cognitive wireless
networks experiences and challenges,” Wireless
Communications and Mobile Computing, vol. 10, pp. 55
2009.
[4]. R. Chen and J. Park “Ensuring Trustwo
Sensing in Cognitive Radio Networks,” Proc., IEEE workshop
5NR 1 4 7 10
BER 0.187
7
0.190
7
0.188
1
0.1817
arch in Engineering and Technology eISSN: 2319
_______________________________________________________________________________________
2014, Available @ http://www.ijret.org
Network. This figure shows 18000 samples for the simulation
shows the Bit error rate reduced continuously
on Attack occurred in network.
the threats from the
wireless communication environment and sense the empty
band through Energy sensing technique. Because of
the practical approach of a secondary user which sense an
without disturbing
work on two types of threats
like primary user emulation attack and jamming attack .These
two are the major threats of cognitive radio network wireless
. Jamming is the common attack
to Denial of Service
improve the work on cognitive
work on the security of
F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “A survey
on spectrum Management in Cognitive Radio Networks,”
IEEE Communications Magazine, April 2008.
Chetan N. Mathur, K.P. Subhalakshami, “Security issues
in cognitive radio netwroks,” Cognitive network: Towards
X. Zhang, C. Li, “Constructing secure cognitive wireless
networks experiences and challenges,” Wireless
Communications and Mobile Computing, vol. 10, pp. 55-69.
R. Chen and J. Park “Ensuring Trustworthy Spectrum
Sensing in Cognitive Radio Networks,” Proc., IEEE workshop
on Networking Technol. For Software Defined Radio
Networks (SDR) 2006, pp. 110
[5]. S. Haykin, Cognitive radio: Brain
communications," IEEEJ. Sele
Communications, vol.23, no.2, pp. 201
[6]. S. Anand, Z. Jin, K. P. Subbalakshmi, “An analytical
model for primary user emulation attacksin cognitive radio
networks,” To appear in Proc., IEEE symposium of New
Frontiers in Dynamic Spectrum Access Networks (DySPAN) ,
Oct.2008.
[7]. Author-Alexandros G. Fragkiadakis, Elias Z. Tragos,
Ioannis G. Askoxylakis “A Survey on Security Threats and
Detection Techniques in Cognitive Radio Networks” IEEE
Communications Surveys & Tutorials, Accepted For
Publication July-2012
[8]. T. Aysal, S. Kandeepan, and R. Pi
Spectrum Sensing with Noisy Hard Decision Transmissions,”
in Proc. ICC, 2009, pp. 1–5.
[9]. Y. Chen, “Collaborative spectrum sensing in the presence
of secondary user interferences for lognormal shadowing,”
Wireless Communications and
[10]. Z. Jin, S. Anand, K. P. Subbalakshmi, “Mitigating
Primary User Emulation Attacks in Dynamic Spectrum Access
Networks using Hypothesis Testing,” Mobile Computing and
Communications Review, vol. 13, no. 2, 2009.
13 16 19
0.169
7
0.16
24
0.15
76
eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
36
on Networking Technol. For Software Defined Radio
Networks (SDR) 2006, pp. 110-119, Sep. 2006.
Cognitive radio: Brain-empowered wireless
communications," IEEEJ. Selected. Areas of
Communications, vol.23, no.2, pp. 201-220, Feb 2005.
S. Anand, Z. Jin, K. P. Subbalakshmi, “An analytical
model for primary user emulation attacksin cognitive radio
networks,” To appear in Proc., IEEE symposium of New
Frontiers in Dynamic Spectrum Access Networks (DySPAN) ,
G. Fragkiadakis, Elias Z. Tragos,
Ioannis G. Askoxylakis “A Survey on Security Threats and
Detection Techniques in Cognitive Radio Networks” IEEE
Communications Surveys & Tutorials, Accepted For
T. Aysal, S. Kandeepan, and R. Piesewicz, “Cooperative
Spectrum Sensing with Noisy Hard Decision Transmissions,”
5.
Y. Chen, “Collaborative spectrum sensing in the presence
of secondary user interferences for lognormal shadowing,”
Wireless Communications and Mobile Computing, 2010.
Z. Jin, S. Anand, K. P. Subbalakshmi, “Mitigating
Primary User Emulation Attacks in Dynamic Spectrum Access
Networks using Hypothesis Testing,” Mobile Computing and
Communications Review, vol. 13, no. 2, 2009.

More Related Content

What's hot

Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...eSAT Publishing House
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radioijngnjournal
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackeSAT Publishing House
 
KEY PERFORMANCE INDICATORS FOR QOS ASSESSMENT IN TETRA NETWORKS
KEY PERFORMANCE INDICATORS FOR QOS ASSESSMENT IN TETRA NETWORKSKEY PERFORMANCE INDICATORS FOR QOS ASSESSMENT IN TETRA NETWORKS
KEY PERFORMANCE INDICATORS FOR QOS ASSESSMENT IN TETRA NETWORKSijmnct
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) ineSAT Publishing House
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
 
Key performance indicators for qos assessment in tetra networks
Key performance indicators for qos assessment in tetra networksKey performance indicators for qos assessment in tetra networks
Key performance indicators for qos assessment in tetra networksijmnct
 
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS ijdpsjournal
 
A Generic Digital Switching System Model
A Generic Digital Switching System ModelA Generic Digital Switching System Model
A Generic Digital Switching System Modelkavithasuresh19
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentFabiha Ain
 
Multiple Group Handling Cognitive Radio Network With High Accuracy
Multiple Group Handling Cognitive Radio Network With High AccuracyMultiple Group Handling Cognitive Radio Network With High Accuracy
Multiple Group Handling Cognitive Radio Network With High AccuracyIRJET Journal
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network Shashank Narayan
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 

What's hot (19)

Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...
 
Unit 6
Unit 6Unit 6
Unit 6
 
70 com
70 com70 com
70 com
 
Simulation and analysis of cognitive radio
Simulation and analysis of cognitive radioSimulation and analysis of cognitive radio
Simulation and analysis of cognitive radio
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attack
 
KEY PERFORMANCE INDICATORS FOR QOS ASSESSMENT IN TETRA NETWORKS
KEY PERFORMANCE INDICATORS FOR QOS ASSESSMENT IN TETRA NETWORKSKEY PERFORMANCE INDICATORS FOR QOS ASSESSMENT IN TETRA NETWORKS
KEY PERFORMANCE INDICATORS FOR QOS ASSESSMENT IN TETRA NETWORKS
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) in
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
 
Key performance indicators for qos assessment in tetra networks
Key performance indicators for qos assessment in tetra networksKey performance indicators for qos assessment in tetra networks
Key performance indicators for qos assessment in tetra networks
 
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
 
A Generic Digital Switching System Model
A Generic Digital Switching System ModelA Generic Digital Switching System Model
A Generic Digital Switching System Model
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignment
 
Multiple Group Handling Cognitive Radio Network With High Accuracy
Multiple Group Handling Cognitive Radio Network With High AccuracyMultiple Group Handling Cognitive Radio Network With High Accuracy
Multiple Group Handling Cognitive Radio Network With High Accuracy
 
Unit 7
Unit 7Unit 7
Unit 7
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network M.tech Term paper report | Cognitive Radio Network
M.tech Term paper report | Cognitive Radio Network
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Ijeet 06 08_006
Ijeet 06 08_006Ijeet 06 08_006
Ijeet 06 08_006
 

Viewers also liked

Looking for Admission in any courses like Graduate and Post Graduate
Looking for Admission in any courses like Graduate and Post GraduateLooking for Admission in any courses like Graduate and Post Graduate
Looking for Admission in any courses like Graduate and Post GraduateHarsh Vardhan Sharma
 
Seminario biologia molecular
Seminario biologia molecularSeminario biologia molecular
Seminario biologia molecularsaracardona1208
 
Institutional Research
Institutional ResearchInstitutional Research
Institutional Research14150892
 
Citizen journalism-Maapsi
Citizen journalism-MaapsiCitizen journalism-Maapsi
Citizen journalism-MaapsiSumit Banik
 
Software Defined Batteries - Synopsis of Microsoft Researchers Project
Software Defined Batteries - Synopsis of Microsoft Researchers ProjectSoftware Defined Batteries - Synopsis of Microsoft Researchers Project
Software Defined Batteries - Synopsis of Microsoft Researchers ProjectWinBuzzer
 
Conference and registration details
Conference and registration detailsConference and registration details
Conference and registration detailsBishwjit Ghoshal
 
Le reseau des professionnels grecs
Le reseau des professionnels grecsLe reseau des professionnels grecs
Le reseau des professionnels grecsBucephalos Business
 
ITIL Processes V2.0D
ITIL Processes V2.0DITIL Processes V2.0D
ITIL Processes V2.0DKaran Saiya
 
Sheikh Zayed Medical College (SZMC) Rahim Yar Khan Merit List 2014
Sheikh Zayed Medical College (SZMC) Rahim Yar Khan Merit List 2014Sheikh Zayed Medical College (SZMC) Rahim Yar Khan Merit List 2014
Sheikh Zayed Medical College (SZMC) Rahim Yar Khan Merit List 2014Rana Waqar
 
Error entropy minimization for brain image registration using hilbert huang t...
Error entropy minimization for brain image registration using hilbert huang t...Error entropy minimization for brain image registration using hilbert huang t...
Error entropy minimization for brain image registration using hilbert huang t...eSAT Publishing House
 
2014 15 product list
2014 15 product list2014 15 product list
2014 15 product listpatimpex
 

Viewers also liked (15)

presentasi kom.Daring
presentasi kom.Daringpresentasi kom.Daring
presentasi kom.Daring
 
Looking for Admission in any courses like Graduate and Post Graduate
Looking for Admission in any courses like Graduate and Post GraduateLooking for Admission in any courses like Graduate and Post Graduate
Looking for Admission in any courses like Graduate and Post Graduate
 
Computer and Information Technology
Computer and Information TechnologyComputer and Information Technology
Computer and Information Technology
 
Seminario biologia molecular
Seminario biologia molecularSeminario biologia molecular
Seminario biologia molecular
 
Canada
CanadaCanada
Canada
 
Institutional Research
Institutional ResearchInstitutional Research
Institutional Research
 
Citizen journalism-Maapsi
Citizen journalism-MaapsiCitizen journalism-Maapsi
Citizen journalism-Maapsi
 
Executive Matchmaker
Executive MatchmakerExecutive Matchmaker
Executive Matchmaker
 
Software Defined Batteries - Synopsis of Microsoft Researchers Project
Software Defined Batteries - Synopsis of Microsoft Researchers ProjectSoftware Defined Batteries - Synopsis of Microsoft Researchers Project
Software Defined Batteries - Synopsis of Microsoft Researchers Project
 
Conference and registration details
Conference and registration detailsConference and registration details
Conference and registration details
 
Le reseau des professionnels grecs
Le reseau des professionnels grecsLe reseau des professionnels grecs
Le reseau des professionnels grecs
 
ITIL Processes V2.0D
ITIL Processes V2.0DITIL Processes V2.0D
ITIL Processes V2.0D
 
Sheikh Zayed Medical College (SZMC) Rahim Yar Khan Merit List 2014
Sheikh Zayed Medical College (SZMC) Rahim Yar Khan Merit List 2014Sheikh Zayed Medical College (SZMC) Rahim Yar Khan Merit List 2014
Sheikh Zayed Medical College (SZMC) Rahim Yar Khan Merit List 2014
 
Error entropy minimization for brain image registration using hilbert huang t...
Error entropy minimization for brain image registration using hilbert huang t...Error entropy minimization for brain image registration using hilbert huang t...
Error entropy minimization for brain image registration using hilbert huang t...
 
2014 15 product list
2014 15 product list2014 15 product list
2014 15 product list
 

Similar to Security threats and detection technique in cognitive

Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksIRJET Journal
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentIRJET Journal
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
 
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...IJSRED
 
L0333057062
L0333057062L0333057062
L0333057062theijes
 
Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016ijcsbi
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Improved performance of scs based spectrum sensing in cognitive radio using d...
Improved performance of scs based spectrum sensing in cognitive radio using d...Improved performance of scs based spectrum sensing in cognitive radio using d...
Improved performance of scs based spectrum sensing in cognitive radio using d...eSAT Journals
 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524IJRAT
 
Transmit power control and data rate enhancement in cognitive radio network u...
Transmit power control and data rate enhancement in cognitive radio network u...Transmit power control and data rate enhancement in cognitive radio network u...
Transmit power control and data rate enhancement in cognitive radio network u...IJECEIAES
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET Journal
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...Eswar Publications
 

Similar to Security threats and detection technique in cognitive (20)

Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...
 
Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...Security threats and detection technique in cognitive radio network with sens...
Security threats and detection technique in cognitive radio network with sens...
 
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio NetworksEnhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
Enhancement of Throughput & Spectrum Sensing of Cognitive Radio Networks
 
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage EnvironmentClient Side Secure De-Duplication Scheme in Cloud Storage Environment
Client Side Secure De-Duplication Scheme in Cloud Storage Environment
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
E010312832
E010312832E010312832
E010312832
 
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
A Novel Approach to Fairly Grant Channel Access to Secondary Users in Cogniti...
 
L0333057062
L0333057062L0333057062
L0333057062
 
Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Improved performance of scs based spectrum sensing in cognitive radio using d...
Improved performance of scs based spectrum sensing in cognitive radio using d...Improved performance of scs based spectrum sensing in cognitive radio using d...
Improved performance of scs based spectrum sensing in cognitive radio using d...
 
Paper id 37201524
Paper id 37201524Paper id 37201524
Paper id 37201524
 
Transmit power control and data rate enhancement in cognitive radio network u...
Transmit power control and data rate enhancement in cognitive radio network u...Transmit power control and data rate enhancement in cognitive radio network u...
Transmit power control and data rate enhancement in cognitive radio network u...
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Study
 
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Co...
 
H010434655
H010434655H010434655
H010434655
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

Security threats and detection technique in cognitive

  • 1. IJRET: International Journal of Research in Engineering and Technology _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE RADIO NETWORK WITH SENSING STRATEGIES 1 Student, Communication world is growing day by day In wire cognitive radio network its name as CRN. In CRN Un user this help to improve the spectrum efficiency as well generate a problem like some malicious or fake users can used the channel and hamper the communication. So in this paper we discuss on security threats and technique to find them with sensing strategies Keywords: Cognitive radio network, Pus, SUs, -------------------------------------------------------------------- 1. INTRODUCTION Communication is a process of transmitting information from one place to another through the medium information sends in the form of electromagnetic waves through the medium air. Here we see the advances in wireless communication. Cognitive radio network is advancement in wireless communication cognitive means sharing, in Cognitive rad network Un-authorized user can used empty channel from the spectrum band of authorized user. Cognitive Radio (CRNs) is an intelligent network that adapt to changes in their network to make a better use of the spectrum. CRNs solve the spectrum shortage problem by allowing unlicensed users to use spectrum band of licensed user without generally authorized or licensed users known as primary users and un-authorized or un-licensed users known as secondary users. When data or information send by authorized or primary user here primary user not used total band some of them are free these empty channels are allowed to used by un authorized or secondary users .Secondary observe the activities of primary user, and when secondary user detect the empty channel and occupy the channel without disturbing the primary user. When the primary users are sending information or it is active, the secondary user should either avoid using the channel. An Empty channel also known as spectrum holes. A spectrum hole is a band of frequencies assigned to a primary user, but at a particular time and specific geographic location, the band is not being utilized by that user. [2].Figure- structure of cognitive radio network. In this secondary user occupy the space called white space of primary user band which is under-utilized. Normally primary user has own communication area, in which secondary user utilized the empty channel without any interference. arch in Engineering and Technology eISSN: 2319 _______________________________________________________________________________________ 2014, Available @ http://www.ijret.org SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE RADIO NETWORK WITH SENSING STRATEGIES Sandeep Thakre1 , Shruti Dixit2 tudent, 2 Professor, EC, SIRT, RGPV, Bhopal, MP, India Abstract ommunication world is growing day by day In wireless communication system introduces a new technology which I known as cognitive radio network its name as CRN. In CRN Un-authorized user can used empty channel from the spectrum band of authorized spectrum efficiency as well generate a problem like some malicious or fake users can used the channel o in this paper we discuss on security threats and technique to find them with sensing strategies Pus, SUs, Spectrum sensing, spectrum holes --------------------------------------------------------------------***---------------------------------------------------------------------- Communication is a process of transmitting information from through the medium information sends in the form of electromagnetic waves through the medium air. the advances in wireless communication. Cognitive radio network is advancement in wireless communication cognitive means sharing, in Cognitive radio authorized user can used empty channel from the spectrum band of authorized user. Cognitive Radio Networks that adapt to changes in their network to make a better use of the spectrum. CRNs solve the spectrum shortage problem by allowing unlicensed users to without interference, or licensed users known as primary users licensed users known as secondary . When data or information send by authorized or primary user here primary user not used total band some of them are free these empty channels are allowed to used by un- .Secondary users always observe the activities of primary user, and when secondary user detect the empty channel and occupy the channel without disturbing the primary user. When the primary users are sending information or it is active, the y user should either avoid using the channel. An Empty channel also known as spectrum holes. A spectrum hole is a band of frequencies assigned to a primary user, but at a particular time and specific geographic location, the band -1 shows the basic structure of cognitive radio network. In this secondary user occupy the space called white space of primary user utilized. Normally primary user has in which secondary user utilized the 1.1 Basic Cognitive Radio Network Fig.1 Basic cognitive radio network Figure-1 shows the architecture of When a primary user (PU) transmits data licensed spectrum band, it may be possible t channels of spectrum other channels are empty channels are sensed by secondary user (SU) which has no license for using this spectrum. Firstly secondary users sensed the spectrum andsend the information of spectrum holes to the SU’s. SU analyses the spectrum that PU ever uses these channels or not, because sometime PU us channels which they not use before operation. After spectrum analysis SU’s decide how required to send their data signal 1.2 Spectrum Sensing Technique It is very important in Cognitive radio network that secondary user properly sense the empty spectrum band. In this paper we use energy sensing technique. bit sequences of primary and secondary user. eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ 34 SECURITY THREATS AND DETECTION TECHNIQUE IN COGNITIVE RADIO NETWORK WITH SENSING STRATEGIES , Bhopal, MP, India introduces a new technology which I known as authorized user can used empty channel from the spectrum band of authorized spectrum efficiency as well generate a problem like some malicious or fake users can used the channel o in this paper we discuss on security threats and technique to find them with sensing strategies. ---------------------------------------------------------------------- Basic Cognitive Radio Network Basic cognitive radio network shows the architecture of cognitive radio cycle. When a primary user (PU) transmits data signal from a licensed spectrum band, it may be possible that it use only few other channels are empty. These empty channels are sensed by secondary user (SU) which has no license for using this spectrum. Firstly secondary users sensed information of spectrum holes to the SU’s. SU analyses the spectrum that PU ever uses these channels or not, because sometime PU use the empty not use before operation. After SU’s decide how many channels they required to send their data signal ctrum Sensing Technique It is very important in Cognitive radio network that secondary user properly sense the empty spectrum band. In this paper we use energy sensing technique. But first look into the original bit sequences of primary and secondary user.
  • 2. IJRET: International Journal of Research in Engineering and Technology _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ Fig-2 Original bit sequence of primary user Figure23 shows bit sequence of primary user , whose data is send in the form of bits, but there is some holes as shown in figure as a gap in between two BPSK modulated signals. This signal gaps is nothing but an empty channels or spectrum holes. Fig 3 Original bit sequence of Secondary User In figure 3 shows bit sequence of secondary user, we use Energy spectrum technique and find the spectrum holes or empty channel without interfering or disturbing the licensed user or primary user. In this Energy Spectrum Sensing techniques, secondary user or un-licensed user analyze the channel whether the channel have some data packets or not, if its energy level is zero then they decided that the spectrum is empty, and SU’s easily send their data to the desired receiver. 2. THREATS OF COGNITIVE RADIO 2.1 PUEs or Primary User Emulsion Attack: Primary user emulsion attack means when primary user send data secondary user continuously monitor the channel primary sends data it means channel busy, this by using energy spectrum sensing technique not send continuously When it is ideal or not busy secondary sense channel and send data but when primary requires channel then sold the control. But if somewhere else arch in Engineering and Technology eISSN: 2319 _______________________________________________________________________________________ 2014, Available @ http://www.ijret.org al bit sequence of primary user 3 shows bit sequence of primary user , whose data is send in the form of bits, but there is some holes as shown in as a gap in between two BPSK modulated signals. This signal gaps is nothing but an empty channels or spectrum Original bit sequence of Secondary User shows bit sequence of secondary user, we use Energy spectrum technique and find the spectrum holes or empty channel without interfering or disturbing the licensed user or primary user. In this Energy Spectrum Sensing licensed user analyze the channel whether the channel have some data packets or not, if its energy level is zero then they decided that the spectrum is empty, and SU’s easily send their data to the desired . THREATS OF COGNITIVE RADIO NETWORK PUEs or Primary User Emulsion Attack: Primary user emulsion attack means when primary user send data secondary user continuously monitor the channel. When secondary knows sensing technique but primary hen it is ideal or not busy state secondary sense channel and send data but when primary ut if somewhere else malicious or fake secondary user work as primary an control of channel and secondary send data at same time malicious user behaves as primary so secondary sold control and not send data such attack referred as primary user emulsion attack.Additional fake or malicious secondary users, may use a primary user emulation attacks to take advantage of the secondary user's ability to avoid primary users and cause excessive and unexpected dis communications.[10] A fundamental characteristic of a CR is its ability for spectrum sensing, an opportunistic manner. This means that the CR has to vacate a currently used spectrum band if an incumbent signal is detected. In this case, CR’s perform spectrum hand off seeking for different spectrum Performing spectrum hand degradation of the CR performance since more time for sensing of the spectrum is required, and this decreases the available time for accessing the spectrum.[3 Figure 4&5 shows Primary User Signals Signals for Primary User Emulsion Attack in Cognitive Radio eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ 35 malicious or fake secondary user work as primary and wants control of channel and secondary send data at same time malicious user behaves as primary so secondary sold control and not send data such attack referred as primary user Additional fake or malicious secondary primary user emulation attacks to take advantage of the secondary user's ability to avoid primary users and cause excessive and unexpected disruptions to ] A fundamental characteristic of a CR is its ability for spectrum sensing, as it shall use the spectrum in an opportunistic manner. This means that the CR has to vacate a currently used spectrum band if an incumbent signal is detected. In this case, CR’s perform spectrum hand- off seeking for different spectrum holes for transmissions. Performing spectrum hand-off very often results in degradation of the CR performance since more time for sensing of the spectrum is required, and this decreases the e for accessing the spectrum.[3] Fig4 Fig5 shows Primary User Signals and Secondary User for Primary User Emulsion Attack in Cognitive Radio
  • 3. IJRET: International Journal of Research in Engineering and Technology _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ Network. This figure shows 18000 samples for the simulation with 2 BPSK. Fig 6 This figure 6 shows the Bit error rate reduced continuously when Primary User Emulsion Attack occurred in network. CONCLUSIONS Through this paper, we practically find the wireless communication environment and sense spectrum band through Energy sensing techn the practical approach of a secondary user empty channel and send their data packets wi the authorized user. In this wework on two types of threats like primary user emulation attack and jamming attack .These two are the major threats of cognitive radio network communication environment. Jamming is the common attack of wireless communication. It is similar to (DoS) attack. In future we willimprove the work on cognitive radio network and try to practically work on the security of threats REFERENCES [1]. F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “A survey on spectrum Management in Cognitive Radio Networks,” IEEE Communications Magazine, April 2008. [2]. Chetan N. Mathur, K.P. Subhalakshami, “Security issues in cognitive radio netwroks,” Cognitive netw Self-Aware Networks, 2007. [3]. X. Zhang, C. Li, “Constructing secure cognitive wireless networks experiences and challenges,” Wireless Communications and Mobile Computing, vol. 10, pp. 55 2009. [4]. R. Chen and J. Park “Ensuring Trustwo Sensing in Cognitive Radio Networks,” Proc., IEEE workshop 5NR 1 4 7 10 BER 0.187 7 0.190 7 0.188 1 0.1817 arch in Engineering and Technology eISSN: 2319 _______________________________________________________________________________________ 2014, Available @ http://www.ijret.org Network. This figure shows 18000 samples for the simulation shows the Bit error rate reduced continuously on Attack occurred in network. the threats from the wireless communication environment and sense the empty band through Energy sensing technique. Because of the practical approach of a secondary user which sense an without disturbing work on two types of threats like primary user emulation attack and jamming attack .These two are the major threats of cognitive radio network wireless . Jamming is the common attack to Denial of Service improve the work on cognitive work on the security of F. Akyildiz, W. Lee, M. C. Vuran, S. Mohanty, “A survey on spectrum Management in Cognitive Radio Networks,” IEEE Communications Magazine, April 2008. Chetan N. Mathur, K.P. Subhalakshami, “Security issues in cognitive radio netwroks,” Cognitive network: Towards X. Zhang, C. Li, “Constructing secure cognitive wireless networks experiences and challenges,” Wireless Communications and Mobile Computing, vol. 10, pp. 55-69. R. Chen and J. Park “Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks,” Proc., IEEE workshop on Networking Technol. For Software Defined Radio Networks (SDR) 2006, pp. 110 [5]. S. Haykin, Cognitive radio: Brain communications," IEEEJ. Sele Communications, vol.23, no.2, pp. 201 [6]. S. Anand, Z. Jin, K. P. Subbalakshmi, “An analytical model for primary user emulation attacksin cognitive radio networks,” To appear in Proc., IEEE symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN) , Oct.2008. [7]. Author-Alexandros G. Fragkiadakis, Elias Z. Tragos, Ioannis G. Askoxylakis “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks” IEEE Communications Surveys & Tutorials, Accepted For Publication July-2012 [8]. T. Aysal, S. Kandeepan, and R. Pi Spectrum Sensing with Noisy Hard Decision Transmissions,” in Proc. ICC, 2009, pp. 1–5. [9]. Y. Chen, “Collaborative spectrum sensing in the presence of secondary user interferences for lognormal shadowing,” Wireless Communications and [10]. Z. Jin, S. Anand, K. P. Subbalakshmi, “Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing,” Mobile Computing and Communications Review, vol. 13, no. 2, 2009. 13 16 19 0.169 7 0.16 24 0.15 76 eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ 36 on Networking Technol. For Software Defined Radio Networks (SDR) 2006, pp. 110-119, Sep. 2006. Cognitive radio: Brain-empowered wireless communications," IEEEJ. Selected. Areas of Communications, vol.23, no.2, pp. 201-220, Feb 2005. S. Anand, Z. Jin, K. P. Subbalakshmi, “An analytical model for primary user emulation attacksin cognitive radio networks,” To appear in Proc., IEEE symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN) , G. Fragkiadakis, Elias Z. Tragos, Ioannis G. Askoxylakis “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks” IEEE Communications Surveys & Tutorials, Accepted For T. Aysal, S. Kandeepan, and R. Piesewicz, “Cooperative Spectrum Sensing with Noisy Hard Decision Transmissions,” 5. Y. Chen, “Collaborative spectrum sensing in the presence of secondary user interferences for lognormal shadowing,” Wireless Communications and Mobile Computing, 2010. Z. Jin, S. Anand, K. P. Subbalakshmi, “Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing,” Mobile Computing and Communications Review, vol. 13, no. 2, 2009.