An Efficient Methodology for Detecting Malicious Nodes in Cognitive Radio Networks

被引:1
|
作者
Kumari, D. Abitha [1 ]
机构
[1] RMK Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Malicious; Node; Networks; Features; Optimization;
D O I
10.1007/s11277-023-10603-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
An efficient malicious node detection system in CR networks is proposed in this paper. This proposed system contains features extraction process and optimization algorithm with soft computing framework. This proposed methodology stated in this paper initially abstracts the features of each individual node in CR network and these individual features are now getting optimized using feed forward radial neural network algorithm, which differentiates each individual node in CR network into either normal or malicious/faulty. This paper analyzes the performance of this proposed work with respect to malicious node detection rate, throughput and latency.
引用
收藏
页码:3089 / 3099
页数:11
相关论文
共 50 条
  • [41] ENERGY-EFFICIENT COGNITIVE RADIO NETWORKS
    Wang, Shaowei
    Granelli, Fabrizio
    Li, Ying
    Chen, Shanzhi
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (07) : 12 - 13
  • [42] An Efficient Radio Resource Management Scheme for Cognitive Radio Networks
    Hong, Chau-Pham Thi
    Kang, Hyung-Seo
    Koo, Insoo
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2010, 6216 : 376 - 383
  • [43] Energy Efficient Multicasting in Cognitive Radio Networks
    Almasoud, Abdullah M.
    Kamal, Ahmed E.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [44] An efficient authentication mechanism for Cognitive radio networks
    Zhu, Li
    Mao, Huaqing
    2011 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2011,
  • [45] Coalition Formation Based Malicious User Detection Scheme in Cognitive Radio Networks
    Huang, Xiaoge
    Chen, Liping
    Chen, Qianbin
    Shen, Bin
    2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2015, : 1415 - 1419
  • [46] FastProbe: Malicious User Detection in Cognitive Radio Networks Through Active Transmissions
    Bansal, Tarun
    Chen, Bo
    Sinha, Prasun
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2517 - 2525
  • [47] Employing machine learning based malicious signal detection for cognitive radio networks
    Turkyilmaz, Yasin
    Senturk, Arafat
    Bayrakdar, Muhammed Enes
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (02):
  • [48] Support vector machine approach of malicious user identification in cognitive radio networks
    Arshid, Kaleem
    Zhang Jianbiao
    Hussain, Iftikhar
    Lema, Gebrehiwet Gebrekrstos
    Yaqub, Muhammad
    Munir, Rizwan
    WIRELESS NETWORKS, 2024, 30 (06) : 4761 - 4772
  • [49] Counteracting Malicious Users in Cognitive Radio Networks over Imperfect Reporting Channels
    Du, Jun
    Xiang, Chaocan
    Guo, Daoxing
    Zhang, Bangning
    Zhang, Hailiang
    2014 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2014,
  • [50] Cooperative spectrum sensing for cognitive radio networks in the presence of smart malicious users
    Haghighat, Maryam
    Sadough, Seyed Mohammad Sajad
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2014, 68 (06) : 520 - 527