A Proposed Algorithm to Enhance Security in CRN

Authors(2) :-Kriti, Dr. Ajay Kaul

With the growing demand of the wireless spectrum leading to its scarcity, motivated the use of Cognitive Radio as the successful way to deal with this problem. The efficient exploitation of the spectrum is done by the Cognitive Radio that allows the licensed spectrum to be utilized by the unlicensed users effectively. This paper illustrates an algorithm which enhances the security in CRN irrespective of the security threat or the attack done by the malicious users. It uses the concept of cluster head generated through random numbers and the formation of slots for the free spectrum based on the round robin algorithm. The efficient management of the spectrum is done so that each user utilizes the spectrum in an effective way without causing harm to the primary users.

Authors and Affiliations

Department of Computer Science and Engineering SMVD University, Jammu & Kashmir, India
Dr. Ajay Kaul
Department of Computer Science and Engineering SMVD University, Jammu & Kashmir, India

primary user (PU); secondary user (SU), cognitive radio network (CRN), primary user emulation (PUE)).

  1. FCC, "Spectrum Policy Task Force Report," Vol. ET Docket Issue 02-155, November 2002.
  2. Danijela Cabric, Shridhar Mubaraq Mishra, Robert W. Brodersen, " Implementation Issues in Spectrum Sensing for Cognitive Radios," Signals, systems and computers, 2004. Conference record of the thirty-eighth Asilomar conference on, Vol. 1, pp. 772-776. IEEE, 2004.
  3. MacKenzie, Allen B. and Stephen B. Wicker. "Game theory in communications: Motivation, explanation, and application to power control." In Global Telecommunications Conference, 2001. GLOBECOM'01. IEEE, vol. 2, pp. 821-826. IEEE, Year 2001.
  4. Zhu, Xiaorong, Lianfeng Shen and T-SP Yum. "Analysis of cognitive radio spectrum access with optimal channel reservation." Communications Letters, no. 4 pp. 304-306.IEEE, Year 2007.
  5. Ji, Zhu and KJ Ray Liu. "Cognitive radios for dynamic spectrum access-dynamic spectrum sharing: A game theoretical overview." Communications Magazine, IEEE 45.5 pp. 88-94, Year 2007.
  6. Cheng, Shilun and Zhen Yang. "Energy-efficient power control game for cognitive radio systems." In Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on, vol. 1, pp. 526-530. IEEE, Year 2007.
  7. Liu, Jishun, Lianfeng Shen, Tiecheng Song and Xiaoxia Wang. "Demand-matching spectrum sharing game for non-cooperative cognitive radio network." In Wireless Communications & Signal Processing, 2009. WCSP 2009. International Conference on, pp. 1-5. IEEE, 2009.
  8. P. Rostaing,T. Pitarque, E. Thierry, " PERFORMANCE ANALYSIS OF A STATISTICAL TEST FOR PRESENCE OF CYCLOSTATIONARITY IN A NOISY OBSERVATION," In Acoustics, Speech, and Signal Processing, 1996. ICASSP-96. Conference Proceedings., 1996 IEEE International Conference on, Vol. 5, pp. 2932-2935, 1996.
  9. V. Srivastava and M. Motani, "Cross-layer design: a survey and the road ahead," Communications Magazine, IEEE, Vol. 43, Issue 12, pp. 112-119, December 2005.
  10. Mishra, Shridhar Mubaraq, Danijela Cabric, Chen Chang, Daniel Willkomm, Barbara Van Schewick, Adam Wolisz, and Robert W. Brodersen, "A real time cognitive radio testbed for physical and link layer experiments," New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. 2005 First IEEE International Symposium on, pp. 562-567. IEEE, 2005.
  11. Danijela ?abri? and Robert W. Brodersen, “Physical Layer Design Issues Unique to Cognitive Radio Systems,”Personal, Indoor and Mobile Radio Communications, 2005. PIMRC 2005. IEEE 16th International Symposium on, Vol. 2, pp. 759-763. IEEE, 2005.
  12. Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, and Shantidev Mohanty, "Next generation/ dynamic spectrum access/cognitive Radio Wireless Networks: A Survey," COMPUTER NETWORKS JOURNAL ELSEVIER," Vol. 50, pp. 2127-2159, 2006.
  13. William A. Gardner, Antonio Napolitano, and Luigi Paura, "Cyclostationarity: Half a century of research," Signal Processing, Vol. 86, Issue 4, pp. 639-697, 2006.
  14. Kyouwoong Kim, Ihsan A. Akbar, Kyung K. Bae, Jung-sun Um, Chad M. Spooner, and Jeffrey H. Reed, "Cyclostationary Approaches to Signal Detection and Classification in Cognitive Radio,” New frontiers in dynamic spectrum access networks, 2007, pp. 212-215,2007.
  15. Alex Chia-Chun Hsu, David S. L. Wei† and C.-C. Jay Kuo, "A Cognitive MAC Protocol Using Statistical Channel Allocation for Wireless Ad-hoc Networks," Wireless Communications and Networking Conference, pp. 105-110. IEEE, 2007.
  16. Lundén, Jarmo, Visa Koivunen, Anu Huttunen, and H. Vincent Poor. "Spectrum sensing in cognitive radios based on multiple cyclic frequencies."Cognitive Radio Oriented Wireless Networks and Communications, 2007. CrownCom 2007. 2nd International Conference on, pp. 37-43. IEEE, 2007.
  17. Qing Zhao and B.M. Sadler, "A Survey of Dynamic Spectrum Access," Signal Processing Magazine, IEEE, Vol. 24, Issue 3, pp. 79-89, may 2007.
  18. ShiyuXu, Zhijin Zhao, Junna Shang, “Spectrum Sensing Based on Cyclostationarity,” Power Electronics and Intelligent Transportation System, 2008. PEITS'08. Workshop on, pp. 171-174. IEEE, 2008
  19. Jun Ma, Guodong Zhao and Ye (Geoffrey) Li, "Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks," IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, pp. 4502-4507, Vol. 7, no 11, November 2008.
  20. Kim, Hyoil, and Kang G. Shin, "In-band spectrum sensing in cognitive radio networks: energy detection or feature detection" in Proceedings of the 14th ACM international conference on Mobile computing and networking, pp. 14-25. ACM, 2008.
  21. Zayen, Bassem, A. M. Hayar, and Dominique Nussbaum, "Blind spectrum sensing for cognitive radio based on model selection," in Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference on, pp. 1-4. IEEE, 2008
  22. Parvin, Sazia, Farookh Khadeer Hussain, Omar Khadeer Hussain, and Abdullah Al Faruque. "Trust-based Throughput in Cognitive Radio Networks." Procedia Computer Science 10 (2012): 713-720.

Publication Details

Published in : Volume 2 | Issue 7 | September 2017
Date of Publication : 2017-09-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 127-134
Manuscript Number : CSEIT174417
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Kriti, Dr. Ajay Kaul, "A Proposed Algorithm to Enhance Security in CRN", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 7, pp.127-134, September-2017.
Journal URL : http://ijsrcseit.com/CSEIT174417

Article Preview