An Efficient Methodology for Detecting Malicious Nodes in Cognitive Radio Networks

被引:1
|
作者
Kumari, D. Abitha [1 ]
机构
[1] RMK Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Malicious; Node; Networks; Features; Optimization;
D O I
10.1007/s11277-023-10603-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
An efficient malicious node detection system in CR networks is proposed in this paper. This proposed system contains features extraction process and optimization algorithm with soft computing framework. This proposed methodology stated in this paper initially abstracts the features of each individual node in CR network and these individual features are now getting optimized using feed forward radial neural network algorithm, which differentiates each individual node in CR network into either normal or malicious/faulty. This paper analyzes the performance of this proposed work with respect to malicious node detection rate, throughput and latency.
引用
收藏
页码:3089 / 3099
页数:11
相关论文
共 50 条
  • [21] Orthogonal beamforming methodology in cognitive radio networks
    Kwon, Yangsoo
    Kim, Hyeonsu
    Yoo, Jaeho
    Chung, Jaehak
    2008 3RD INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2008, : 89 - 93
  • [22] On Efficient Multicasting in Cognitive Radio Networks
    Goyal, Diksha
    Singh, Awadhesh Kumar
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (INCITE) - NEXT GENERATION IT SUMMIT ON THE THEME - INTERNET OF THINGS: CONNECT YOUR WORLDS, 2016,
  • [23] Efficient Communication in Cognitive Radio Networks
    Gilbert, Seth
    Kuhn, Fabian
    Newport, Calvin
    Zheng, Chaodong
    PODC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2015, : 119 - 128
  • [24] Launcher nodes for detecting efficient influencers in social networks
    Martins P.
    Martins F.A.
    Online Social Networks and Media, 2021, 25
  • [25] AN EFFICIENT TRUST MODEL FOR PUBLIC-KEY AUTHENTICATION AND DETECTING MALICIOUS NODES IN MANET
    Adivel, Kanimozhi
    Meganathan, Navamani Thandava
    IIOAB JOURNAL, 2016, 7 : 255 - 261
  • [26] A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks
    Khan, Muhammad Sajjad
    Jibran, Muhammad
    Koo, Insoo
    Kim, Su Min
    Kim, Junsu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [27] Robust Cooperative Primary User Detection in Malicious Cognitive Radio Networks
    As-Sayid-Ahmad, Loqman
    Mansour, Nour
    Dahlhaus, Dirk
    2022 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2022, : 65 - 71
  • [28] Joint Malicious User Detection and Resource Allocation in Cognitive Radio Networks
    Huang, Xiaoge
    Chen, Liping
    Chen, Qianbin
    Shen, Bin
    PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 278 - 282
  • [29] Optimal Energy Detection in Cognitive Radio Networks in the Presence of Malicious Users
    Saber, Mohammad Javad
    Sadough, Seyed Mohammad Sajad
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 173 - 177
  • [30] An Empirical Analysis of the Effect of Malicious Users in Decentralised Cognitive Radio Networks
    Sivakumaran, A.
    Alfa, Attahiru S.
    Maharaj, B. T.
    2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,