Detection of Selfish Node Attacks using Dirichlet's Distribution in Cognitive Radio Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2018 by IJETT Journal
Volume-57 Number-2
Year of Publication : 2018
Authors : T.E.Abinaya, S.Rabia jebin
DOI :  10.14445/22315381/IJETT-V57P220

Citation 

T.E.Abinaya, S.Rabia jebin "Detection of Selfish Node Attacks using Dirichlet's Distribution in Cognitive Radio Networks", International Journal of Engineering Trends and Technology (IJETT), V57(2),98-102 March 2018. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Cognitive radio (CR) is an emerging technology that aims for efficientspectrum usage by allowing a secondary user (SU) to access a primary user (PU)spectrum bands on the condition that the interference caused to Pus is tolerable .Initially, Non- CR networks the power allocation strategy was designed to maximize theErgonomic capacity (EC) in a fading channel. In a CR network, the power allocationstrategy was modified in order to protect the Quality of Services (QoS) of the Pus fromthe interference caused by the SUs. Recently, Green communication is an inevitabletrend for designing a network, especially for a cognitive radio. In this project, for a green cognitive radio networks, the optimal powerallocation strategies are proposed to enhance the energy efficiency for the secondaryuser to maximize its ergonomic/outage capacity, under the average interference power along with average/peak transmit power constraint by using dirichlet's distribution. where a secondary user coexists with a primary user and the channels are fading.

Reference
1) Rajahs K. Dharma, Member, IEEE and Dana B. Rabat, “Advances on Security Threats and Countermeasures for Cognitive Radio Networks:A Survey”, IEEE Communication Surveys and Tutorials, Vol. 17,no.2, Second Quarter 20.
2)Min ho Jo, Longhouse Han, Don Kim and Ho Peter (May 2013),“Selfish Attacks and Detection in Cognitive Radio Networks”, Korea University, Vol 27, Issue: 3, IEEE Network
3)Bacchanalian, K. Amish Po Ya mini, “Credit Risk Value based Detection of Multiple Salish Node Attacks in Cognitive Radio Networks”, IJERT: International Journal of Research in Engineering and Technology Volume: 03, Special Issue: 07|May 2014.
4)W. Wang, Y. Sun, H. Li, Z. Han, “Cross Layer attack and Defense in Cognitive Radio Networks”, in Globe com, 2010, pp.1- 6.[20] Coda Silva, B. Chou and K. Kim, “Distributed Spectrum Sensing for Cognitive Radio Systems”, in Prof. Information Theory and Applications Workshop, 2007, pp.120-123.1106.
5)Hui Thou, Norman C. Beau lieu,Zn Li, Jungian Si, and Penchant Q, “Energy-Efficient Optimal Power Allocation for Fading Cognitive Radio Channels: Ergonomic Capacity, Outage Capacity, and Minimum-Rate Capacity”, IEEE Transactions on wireless communications , vol. 15, no. 4, April 2016
6)Y. Chen, S. Hang, S. X, and G. Li, “Fundamental trade-offs on green wireless networks,” IEEE Communications. Mag., vol. 49, no. 6, pp. 30–37, Jun. 2011.
7) D. Deng, C. Nanjing, G. Lin, L. J. Bimini, G. Deng, and G. Y. Li, “A survey of energy-efficient wireless communications,” IEEE Communication. Surveys Tuts., vol. 15, no. 1, pp. 167–178, Feb. 2013.
8)C. Xiongnu, L. Lu, and G. Li, “Energy-efficient spectrum access in cognitive radios,” IEEE J. Se. Areas Com mun., vol. 32, no. 3, pp. 550–562, Mar.2014.
9)G. Gr and F. Scalawag, “Green wireless communications via cognitive dimension: An overview,” IEEE Newt., vol. 25, no. 2, pp. 50–56, Mar.2011.
10)C. Nanjing, H. Hang, Y. Re, and H. Chen, “Energy-efficient non cooperative cognitive radio networks: Micro, emos, and macro views,”IEEE Com mun. Mag.,vol. 52, no. 7, pp. 14–20, Jun. 2014
11)X. Kan, R. Hang, Y. C. Lang, and H. K. Gary, “Optimal power allocation strategies for fading cognitive radio channels with primary user outage constraint,” IEEE J. Se. Areas Com mun., vol. 29, no. 2, pp. 374–383, Feb. 2011.

keywords
selfish node, Interference, cognitive radio networks