Distributed Intrusion Detection System for Cognitive Radio Networks Based on Weighted Fair Queuing Algorithm

Authors

  • M. Indhumathi  Research Scholar, Department of Computer Science, Sakthi College of Arts and Science for Women, Oddanchatram, India
  • S. Kavitha  Head & Associate Professor, Department of Computer Science, Sakthi College of Arts and Science For Women, Oddanchatram, India

Keywords:

Safety, cognitive radio networks, intrusion detection, IDS Agent, cooperative detection center, Dempster-Shafer's evidence theory

Abstract

Reliable detection of intrusion is the basis of safety in cognitive radio networks (CRNs). So far, few scholars applied intrusion detection systems (IDS) to combat intrusion against CRNs. In order to improve the performance of intrusion detection in CRNs, a distributed intrusion detection scheme has been proposed. In this paper, a method base on Dempster-Shafer's (DS) evidence theory to detect intrusion in CRNs is put forward, in which the detection data and credibility of different local IDS Agent is combined by D-S in the cooperative detection center, so that different local detection decisions are taken into consideration in the final decision. The effectiveness of the proposed scheme is verified by simulation, and the results reflect a noticeable performance improvement between the proposed scheme and the traditional method.

References

  1. T. Hara, V.I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Information Explosion Era, Studies in Computational Intelligence, vol. 278. Springer-Verlag, 2010.
  2. Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
  3. A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks, “Computer Comm.,vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.
  4. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Micro sensor Networks,” IEEE Trans. Wireless Comm.,vol. 1, no. 4, pp. 660-670, Oct. 2002.
  5. A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.
  6. S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks, “Computer Comm.,vol. 30, nos. 14/15, pp. 2842-2852, 2007.
  7. K. Pradeepa,W.R.Anne, andS.Duraisamy,“Design and Implementation Issues of Clustering in Wireless Sensor Net-works,” Int’l J. Computer Applications, vol. 47, no. 11, pp. 23-28, 2012.
  8. L.B. Oliveira et al., “Sec LEACH-On the Security of Clustered Sensor Networks,” Signal Processing, vol. 87, pp. 2882-2895, 2007.
  9. K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” Proc. Fourth Int’l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM),pp. 1-5, 2008.
  10. P. Banerjee, D. Jacobson, and S. Lahiri, “Security and Performance Analysis of a Secure Clustering Protocol for Sensor Networks,” Proc. IEEE Sixth Int’l Symp. Network Computing and Applications (NCA),pp. 145-152, 2007.
  11. K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” Proc. Fourth Int’l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM),pp. 1-5, 2008.

GeekPrank.com will make everyone believe they are looking at a real Windows XP operating system, but the thruth is that this is just a simulator running in a web browser.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. Indhumathi, S. Kavitha, " Distributed Intrusion Detection System for Cognitive Radio Networks Based on Weighted Fair Queuing Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.426-436, March-April-2018.