Distributed Intrusion Detection System for Cognitive Radio Networks Based on Weighted Fair Queuing Algorithm

Authors(2) :-M. Indhumathi, S. Kavitha

Reliable detection of intrusion is the basis of safety in cognitive radio networks (CRNs). So far, few scholars applied intrusion detection systems (IDS) to combat intrusion against CRNs. In order to improve the performance of intrusion detection in CRNs, a distributed intrusion detection scheme has been proposed. In this paper, a method base on Dempster-Shafer's (DS) evidence theory to detect intrusion in CRNs is put forward, in which the detection data and credibility of different local IDS Agent is combined by D-S in the cooperative detection center, so that different local detection decisions are taken into consideration in the final decision. The effectiveness of the proposed scheme is verified by simulation, and the results reflect a noticeable performance improvement between the proposed scheme and the traditional method.

Authors and Affiliations

M. Indhumathi
Research Scholar, Department of Computer Science, Sakthi College of Arts and Science for Women, Oddanchatram, India
S. Kavitha
Head & Associate Professor, Department of Computer Science, Sakthi College of Arts and Science For Women, Oddanchatram, India

Safety, cognitive radio networks, intrusion detection, IDS Agent, cooperative detection center, Dempster-Shafer's evidence theory

  1. T. Hara, V.I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Information Explosion Era, Studies in Computational Intelligence, vol. 278. Springer-Verlag, 2010.
  2. Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
  3. A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks, “Computer Comm.,vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.
  4. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Micro sensor Networks,” IEEE Trans. Wireless Comm.,vol. 1, no. 4, pp. 660-670, Oct. 2002.
  5. A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.
  6. S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks, “Computer Comm.,vol. 30, nos. 14/15, pp. 2842-2852, 2007.
  7. K. Pradeepa,W.R.Anne, andS.Duraisamy,“Design and Implementation Issues of Clustering in Wireless Sensor Net-works,” Int’l J. Computer Applications, vol. 47, no. 11, pp. 23-28, 2012.
  8. L.B. Oliveira et al., “Sec LEACH-On the Security of Clustered Sensor Networks,” Signal Processing, vol. 87, pp. 2882-2895, 2007.
  9. K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” Proc. Fourth Int’l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM),pp. 1-5, 2008.
  10. P. Banerjee, D. Jacobson, and S. Lahiri, “Security and Performance Analysis of a Secure Clustering Protocol for Sensor Networks,” Proc. IEEE Sixth Int’l Symp. Network Computing and Applications (NCA),pp. 145-152, 2007.
  11. K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” Proc. Fourth Int’l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM),pp. 1-5, 2008.

GeekPrank.com will make everyone believe they are looking at a real Windows XP operating system, but the thruth is that this is just a simulator running in a web browser.

Publication Details

Published in : Volume 3 | Issue 3 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 426-436
Manuscript Number : CSEIT1833232
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

M. Indhumathi, S. Kavitha, "Distributed Intrusion Detection System for Cognitive Radio Networks Based on Weighted Fair Queuing Algorithm", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.426-436, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT1833232

Follow Us

Contact Us