International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Review Papers | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

Modified Belief Propagation-Based Defense against Routing Toward Primary User Attack in Cognitive Radio Networks

Dhanashree Yogesh Jangam, Aruna K. Gupta

Current wireless networks are characterized by a static spectrum allocation policy, where governmental agencies assign wireless spectrum to license holders on a long term basis for large geographical regions ISM band has enabled the explosion of new technologies that is Wi-Fi due to this its license is free from characteristic. The widespreadadoption of Wi-Fi technology, combined with the rapid penetration of smart phonesrunning popular user services has overcrowded substantially the ISM band. Cognitive radio (CR) networks have involved many attentions newly, whilethe security issues are not yet studied fully. In this approach, propose a new and powerfulnetwork layer attack called routing-toward-primary-user (RPU) attack in Cognitive Radio networks. In this attack malicious nodes intentionally route a large amount of packets In this approach, suggest a new and powerful network layer attack called routing toward-primary-user (RPU) attack in Cognitive Radio networks. In this attack malicious nodes intentionally route a large amount of packets toward the primary users (PUs), purpose of malicious node is to cause interference to the PUs and to increase delay in thedata transmission among the secondary users.The main objective of the proposed work is to minimize the time for sendingthe data, and send the data by the path which is the longest distance from the primaryuser network. For that the pre belief value is calculated., belief propagation used to develop a defense strategy. Here a initial rout establish from source to destination, then according to it the each node keeps a feedback of other node on the route, compute belief, exchanges of feedback in a table record. On the basis of final belief values, the source node detects the malicious path.

Keywords: Belief propagation, Cognitive, Modified BP, Radio Network, Routing toward primary user attack, security

Edition: Volume 3 Issue 7, July 2014

Pages: 866 - 871


How to Cite this Article?

Dhanashree Yogesh Jangam, Aruna K. Gupta, "Modified Belief Propagation-Based Defense against Routing Toward Primary User Attack in Cognitive Radio Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141174, Volume 3 Issue 7, July 2014, 866 - 871

30 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cognitive'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 772 - 775

Knowledge Navigator for Intelligent Collaborative E-Tutoring: A Proposed Framework using Fuzzy Cognitive Agent

Neha Gulati

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1346 - 1350

Energy Aware Routing in Next Generation Wireless Networks Using Efficient Resource Allocation

Gajanan Heddure, S. P. Pingat

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1193 - 1198

MAC Algorithm for Cognitive Radio Networks Based on Traffic Type

Ashwini S, Manjul Krishna Gupta

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 866 - 871

Modified Belief Propagation-Based Defense against Routing Toward Primary User Attack in Cognitive Radio Networks

Dhanashree Yogesh Jangam, Aruna K. Gupta

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1579 - 1582

MANET, Security Attacks and Routing Protocol: A Survey

Navanpreet Kaur, Harjit Singh

Share this article



Similar Articles with Keyword 'Radio Network'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1346 - 1350

Energy Aware Routing in Next Generation Wireless Networks Using Efficient Resource Allocation

Gajanan Heddure, S. P. Pingat

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1193 - 1198

MAC Algorithm for Cognitive Radio Networks Based on Traffic Type

Ashwini S, Manjul Krishna Gupta

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 866 - 871

Modified Belief Propagation-Based Defense against Routing Toward Primary User Attack in Cognitive Radio Networks

Dhanashree Yogesh Jangam, Aruna K. Gupta

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1579 - 1582

MANET, Security Attacks and Routing Protocol: A Survey

Navanpreet Kaur, Harjit Singh

Share this article



Similar Articles with Keyword 'security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article
Top