An Efficient Methodology for Detecting Malicious Nodes in Cognitive Radio Networks

被引:0
|
作者
D. Abitha Kumari
机构
[1] R.M.K. Engineering College,
[2] Department of Computer Science & Engineering,undefined
来源
关键词
Malicious; Node; Networks; Features; Optimization;
D O I
暂无
中图分类号
学科分类号
摘要
An efficient malicious node detection system in CR networks is proposed in this paper. This proposed system contains features extraction process and optimization algorithm with soft computing framework. This proposed methodology stated in this paper initially abstracts the features of each individual node in CR network and these individual features are now getting optimized using feed forward radial neural network algorithm, which differentiates each individual node in CR network into either normal or malicious/faulty. This paper analyzes the performance of this proposed work with respect to malicious node detection rate, throughput and latency.
引用
收藏
页码:3089 / 3099
页数:10
相关论文
共 50 条
  • [1] An Efficient Methodology for Detecting Malicious Nodes in Cognitive Radio Networks
    Kumari, D. Abitha
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 131 (04) : 3089 - 3099
  • [2] A Survey on Cognitive Radio Networks for Detecting Unwanted Access of Malicious Nodes
    Kongkham, Dinokumar
    Sundararajan, M.
    PROCEEDINGS OF 2019 1ST INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION AND COMMUNICATION TECHNOLOGY (ICIICT 2019), 2019,
  • [3] A Trust Framework to Detect Malicious Nodes in Cognitive Radio Networks
    Rathee, Geetanjali
    Ahmad, Farhan
    Kerrache, Chaker A.
    Azad, Muhammad Ajmal
    ELECTRONICS, 2019, 8 (11)
  • [4] Cooperative sensing method considering malicious nodes in cognitive radio networks
    Qi, Xiao-Gang
    Zheng, Sheng-Yu
    Liu, Li-Fang
    Wang, Hui-Fang
    Tongxin Xuebao/Journal on Communications, 2015, 36 (06):
  • [5] An efficient scheme for detecting malicious nodes in mobile ad hoc networks
    Choi, Jongoh
    Cha, Si-Ho
    Song, JooSeok
    Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 179 - 193
  • [6] Efficient elimination of erroneous nodes in cooperative sensing for cognitive radio networks
    Srinu, Sesham
    Mishra, Amit Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 52 : 284 - 292
  • [7] Detecting and isolating malicious nodes in wireless ad hoc networks
    Li, Fanzhi
    Jassim, Sabah
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [8] Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks
    Mukherjee, Partha
    Sen, Sandip
    COMPUTER JOURNAL, 2011, 54 (03): : 482 - 489
  • [9] MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
    Ren, Yanzhi
    Chuah, Mooi Choo
    Yang, Jie
    Chen, Yingying
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [10] A Statistical Trust for Detecting Malicious Nodes in IoT Sensor Networks
    Wang, Fang
    Wei, Zhe
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (08) : 1084 - 1087