An Efficient Methodology for Detecting Malicious Nodes in Cognitive Radio Networks

被引:0
|
作者
D. Abitha Kumari
机构
[1] R.M.K. Engineering College,
[2] Department of Computer Science & Engineering,undefined
来源
关键词
Malicious; Node; Networks; Features; Optimization;
D O I
暂无
中图分类号
学科分类号
摘要
An efficient malicious node detection system in CR networks is proposed in this paper. This proposed system contains features extraction process and optimization algorithm with soft computing framework. This proposed methodology stated in this paper initially abstracts the features of each individual node in CR network and these individual features are now getting optimized using feed forward radial neural network algorithm, which differentiates each individual node in CR network into either normal or malicious/faulty. This paper analyzes the performance of this proposed work with respect to malicious node detection rate, throughput and latency.
引用
收藏
页码:3089 / 3099
页数:10
相关论文
共 50 条
  • [31] Malicious users control and management in cognitive radio networks with priority queues
    Okegbile, Samuel D.
    Maharaj, B. T.
    Alfa, Attahiru S.
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [32] Malicious User Detection for Wide-band Cognitive Radio Networks
    Wu, Hongxing
    Sun, Xuekang
    Guo, Caili
    Ren, Shiyu
    2016 ASIA-PACIFIC MICROWAVE CONFERENCE (APMC2016), 2016,
  • [33] A New Security Localization method for Detecting malicious beacon nodes in wireless sensor networks
    Miao, Chen
    Bao, Peng
    Liang, Ma
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 428 - 432
  • [34] FBMT: Fuzzy Based Merkle Technique for Detecting and Mitigating Malicious Nodes in Sensor Networks
    Sundararajan, Ranjeeth Kumar
    Arumugam, Umamakeswari
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (06) : 1106 - 1113
  • [35] A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor networks
    Jiang, Yuan-xi
    Zhao, Bao-hua
    2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 49 - 55
  • [36] Methods of Detecting of Unknown Signals in Cognitive Radio Networks
    Ivanenko, Stanislav
    Bezruk, Valeriy
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 199 - 200
  • [37] Removing Malicious Nodes from Networks
    Yu, Sixie
    Vorobeychik, Yevgeniy
    AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 314 - 322
  • [38] An Energy-Efficient and Compact Clustering Scheme with Temporary Support Nodes for Cognitive Radio Sensor Networks
    Salim, Shelly
    Moh, Sangman
    Choi, Dongmin
    Chung, Ilyong
    SENSORS, 2014, 14 (08): : 14634 - 14653
  • [39] Connectivity of Two Nodes in Cognitive Radio Ad Hoc Networks
    Liu, Jianwei
    Zhang, Qixun
    Zhang, Yuchi
    Wei, Zhiqing
    Ma, Sisi
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1186 - 1191
  • [40] Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks
    Jeon, Hyoungsuk
    McLaughlin, Steven W.
    Kim, Il-Min
    Ha, Jeongseok
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (04) : 1790 - 1805