[go: up one dir, main page]

Sudha et al., 2020 - Google Patents

Evolution of the Security Models in Cognitive Radio Networks: Challenges and Open Issues

Sudha et al., 2020

Document ID
12134625290841733365
Author
Sudha Y
Sarasvathi V
Publication year
Publication venue
2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)

External Links

Snippet

Inclusion of Cognitive Radio Network (CRN) in different networking technologies is proven to offer an efficient communication system due to its potential characteristics of managing the transmission and reception attributes, especially in the wireless environment. CRN …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • H04W72/08Wireless resource allocation where an allocation plan is defined based on quality criteria
    • H04W72/082Wireless resource allocation where an allocation plan is defined based on quality criteria using the level of interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • H04W72/08Wireless resource allocation where an allocation plan is defined based on quality criteria
    • H04W72/085Wireless resource allocation where an allocation plan is defined based on quality criteria using measured or perceived quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/713Spread spectrum techniques using frequency hopping
    • H04B1/715Interference-related aspects

Similar Documents

Publication Publication Date Title
Nadeem et al. A survey of MANET intrusion detection & prevention approaches for network layer attacks
El-Hajj et al. Survey of security issues in cognitive radio networks
Jo et al. Selfish attacks and detection in cognitive radio ad-hoc networks
Meghanathan A survey on the communication protocols and security in cognitive radio networks
Wei et al. Cooperative spectrum sensing with trust assistance for cognitive radio vehicular ad hoc networks
Arokiamary et al. Analysis of dynamic interference constraints in cognitive radio cloud networks
Salameh et al. Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications
Kar et al. A multi-factor trust management scheme for secure spectrum sensing in cognitive radio networks
Sankar Chatterjee et al. Lightweight cloned‐node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs
Matin Spectrum Access and Management for cognitive radio networks
Bany Salameh et al. Secure routing in multi-hop iot-based cognitive radio networks under jamming attacks
Nallarasan et al. Cognitive radio jamming attack detection using an autoencoder for CRIoT network
Fragkiadakis et al. Securing cognitive wireless sensor networks: A survey
Bhattacharjee et al. Cognitive radio networks security threats and attacks: a review
Mazumdar et al. To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT
Abidoye et al. Lightweight models for detection of denial‐of‐service attack in wireless sensor networks
Kar et al. Security challenges in cognitive radio network and defending against Byzantine attack: a survey
Sindhuja et al. CR-IOT based selfish attack detection via RSSI-LSTM
Testi et al. Wireless network analytics for the new era of spectrum patrolling and monitoring
Joshi et al. Switching algorithm in listen-and-talk-based MAC protocols for full-duplex cognitive radio networks with type 2 fuzzy cooperative spectrum sensing
Singh et al. Capitulation of mitigation techniques of packet drop attacks in MANET to foreground nuances and ascertain trends
Sudha et al. Evolution of the Security Models in Cognitive Radio Networks: Challenges and Open Issues
Alajmi et al. Comparative analysis of selective forwarding attacks over Wireless Sensor Networks
Gunasekaran et al. A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks
Khan et al. Distributed and coordinated spectrum access methods for heterogeneous channel bonding