Sudha et al., 2020 - Google Patents
Evolution of the Security Models in Cognitive Radio Networks: Challenges and Open IssuesSudha et al., 2020
- Document ID
- 12134625290841733365
- Author
- Sudha Y
- Sarasvathi V
- Publication year
- Publication venue
- 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)
External Links
Snippet
Inclusion of Cognitive Radio Network (CRN) in different networking technologies is proven to offer an efficient communication system due to its potential characteristics of managing the transmission and reception attributes, especially in the wireless environment. CRN …
- 230000001149 cognitive 0 title abstract description 36
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
- H04W72/08—Wireless resource allocation where an allocation plan is defined based on quality criteria
- H04W72/082—Wireless resource allocation where an allocation plan is defined based on quality criteria using the level of interference
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
- H04W72/08—Wireless resource allocation where an allocation plan is defined based on quality criteria
- H04W72/085—Wireless resource allocation where an allocation plan is defined based on quality criteria using measured or perceived quality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/713—Spread spectrum techniques using frequency hopping
- H04B1/715—Interference-related aspects
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nadeem et al. | A survey of MANET intrusion detection & prevention approaches for network layer attacks | |
El-Hajj et al. | Survey of security issues in cognitive radio networks | |
Jo et al. | Selfish attacks and detection in cognitive radio ad-hoc networks | |
Meghanathan | A survey on the communication protocols and security in cognitive radio networks | |
Wei et al. | Cooperative spectrum sensing with trust assistance for cognitive radio vehicular ad hoc networks | |
Arokiamary et al. | Analysis of dynamic interference constraints in cognitive radio cloud networks | |
Salameh et al. | Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications | |
Kar et al. | A multi-factor trust management scheme for secure spectrum sensing in cognitive radio networks | |
Sankar Chatterjee et al. | Lightweight cloned‐node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs | |
Matin | Spectrum Access and Management for cognitive radio networks | |
Bany Salameh et al. | Secure routing in multi-hop iot-based cognitive radio networks under jamming attacks | |
Nallarasan et al. | Cognitive radio jamming attack detection using an autoencoder for CRIoT network | |
Fragkiadakis et al. | Securing cognitive wireless sensor networks: A survey | |
Bhattacharjee et al. | Cognitive radio networks security threats and attacks: a review | |
Mazumdar et al. | To mitigate primary user emulation attack trajectory using cognitive single carrier frequency division multiple access approaches: Towards next generation green IoT | |
Abidoye et al. | Lightweight models for detection of denial‐of‐service attack in wireless sensor networks | |
Kar et al. | Security challenges in cognitive radio network and defending against Byzantine attack: a survey | |
Sindhuja et al. | CR-IOT based selfish attack detection via RSSI-LSTM | |
Testi et al. | Wireless network analytics for the new era of spectrum patrolling and monitoring | |
Joshi et al. | Switching algorithm in listen-and-talk-based MAC protocols for full-duplex cognitive radio networks with type 2 fuzzy cooperative spectrum sensing | |
Singh et al. | Capitulation of mitigation techniques of packet drop attacks in MANET to foreground nuances and ascertain trends | |
Sudha et al. | Evolution of the Security Models in Cognitive Radio Networks: Challenges and Open Issues | |
Alajmi et al. | Comparative analysis of selective forwarding attacks over Wireless Sensor Networks | |
Gunasekaran et al. | A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks | |
Khan et al. | Distributed and coordinated spectrum access methods for heterogeneous channel bonding |