Detection of Primary User Emulation Attack in Cognitive Radio Networks Based on TDOA Using Novel Bat Algorithm

Detection of Primary User Emulation Attack in Cognitive Radio Networks Based on TDOA Using Novel Bat Algorithm
Author :
Publisher :
Total Pages : 92
Release :
ISBN-10 : 3668943400
ISBN-13 : 9783668943407
Rating : 4/5 (00 Downloads)

Book Synopsis Detection of Primary User Emulation Attack in Cognitive Radio Networks Based on TDOA Using Novel Bat Algorithm by : Aasia Rehman

Download or read book Detection of Primary User Emulation Attack in Cognitive Radio Networks Based on TDOA Using Novel Bat Algorithm written by Aasia Rehman and published by . This book was released on 2019-02-27 with total page 92 pages. Available in PDF, EPUB and Kindle. Book excerpt: Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation. After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it


Detection of Primary User Emulation Attack in Cognitive Radio Networks Based on TDOA Using Novel Bat Algorithm Related Books

Detection of Primary User Emulation Attack in Cognitive Radio Networks Based on TDOA Using Novel Bat Algorithm
Language: en
Pages: 92
Authors: Aasia Rehman
Categories:
Type: BOOK - Published: 2019-02-27 - Publisher:

DOWNLOAD EBOOK

Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, course: M. Tech - Cognitive Radio Networks, language: English, abstra
Primary User Emulation Detection in Cognitive Radio Networks
Language: en
Pages: 256
Authors: Di Pu
Categories:
Type: BOOK - Published: 2013 - Publisher:

DOWNLOAD EBOOK

Abstract: Cognitive radios (CRs) have been proposed as a promising solution for improving spectrum utilization via opportunistic spectrum sharing. In a CR netwo
Adversary Detection For Cognitive Radio Networks
Language: en
Pages: 83
Authors: Xiaofan He
Categories: Technology & Engineering
Type: BOOK - Published: 2018-03-07 - Publisher: Springer

DOWNLOAD EBOOK

This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of
Detecting Primary User Emulation Attacks in Cognitive Radio Networks
Language: en
Pages: 50
Authors: Fan Jin
Categories: Cognitive radio networks
Type: BOOK - Published: 2015 - Publisher:

DOWNLOAD EBOOK

This thesis first covers an introduction of cognitive radio, dynamic spectrum access and spectrum sensing, as well as the potential security threats and their i
Primary User Emulation Attacks in Cognitive Radio
Language: en
Pages: 70
Authors: Benjamin James Ealey
Categories:
Type: BOOK - Published: 2011 - Publisher:

DOWNLOAD EBOOK

Cognitive radio networks rely on the ability to avoid primary users, owners of the frequency, and prevent collisions for eective communication to take place. Ad