Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Suchita S. Potdar, Dr. Mallikarjun

Cognitive radio is an opportunistic communication technology designed to help unlicensed users to utilize the maximum available licensed bandwidth. Cognitive radio has recently attracted a lot of research interest. However, little research has been done regarding security in cognitive radio, while much more work has been done on spectrum sensing and allocation problems. A selfish cognitive radio node can occupy all or part of the resources of multiple channels, prohibiting other cognitive radio nodes from accessing these resources. Selfish cognitive radio attacks deals with serious security problem like fake signal attack, Channel pre-occupation attack. These security problems they significantly degrade the performance of a cognitive radio network. In this proposal we identify the types of selfish attacks in cognitive radio ad-hoc networks and propose an easy and efficient selfish cognitive radio attack detection technique using Markov chain model and Game Theory. This technique is simple and reliable and can be well fitted for practical work in future work.

Keywords: Cognitive Radio, Markov Chain, Game Theory

Edition: Volume 3 Issue 8, August 2014

Pages: 1999 - 2003

Share this Article

How to Cite this Article?

Suchita S. Potdar, Dr. Mallikarjun, "Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015748, Volume 3 Issue 8, August 2014, 1999 - 2003

122 PDF Views | 106 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cognitive Radio'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1579 - 1582

MANET, Security Attacks and Routing Protocol: A Survey

Navanpreet Kaur, Harjit Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1346 - 1350

Energy Aware Routing in Next Generation Wireless Networks Using Efficient Resource Allocation

Gajanan Heddure, S. P. Pingat

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 866 - 871

Modified Belief Propagation-Based Defense against Routing Toward Primary User Attack in Cognitive Radio Networks

Dhanashree Yogesh Jangam, Aruna K. Gupta

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1193 - 1198

MAC Algorithm for Cognitive Radio Networks Based on Traffic Type

Ashwini S, Manjul Krishna Gupta

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1278 - 1284

Introduction to Cognitive Radio Network and survey on MAC protocols for Cognitive Radio Networks

Kiran Godara, Rishipal Singh

Share this Article

Similar Articles with Keyword 'Markov Chain'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1047 - 1050

State- Based Approach to Analyze the Reliability of Component Based Software

Pooja Gupta, Amanpreet Kaur Boparai

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1999 - 2003

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Suchita S. Potdar, Dr. Mallikarjun

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019

Pages: 470 - 475

Clickstream Data Analysis Using Data Mining in R

Anubhuti Singh, Sandhya Tarar

Share this Article

Similar Articles with Keyword 'Game Theory'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1951 - 1957

Energy Efficient Cluster Based Technique for Resource Allocation in MANET

R. Preethi, Dr. R. Anbuselvi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2832 - 2834

A Novel Game-Theoretic Method for Detecting Malware in Delay-Tolerant Networks

Jayalekshmi. S, Jebakumari. M

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1955 - 1959

Cloud Partitioning Based Load Balancing Model for Performance Enhancement in Public Cloud

Neha Gohar Khan, Prof. V. B. Bhagat Mate

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1999 - 2003

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Suchita S. Potdar, Dr. Mallikarjun

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1427 - 1431

Real Time Game Theoretic Load Balancing With Cluster Based Load Classification for Private and Public Virtual Cloud

Srikant Bagewadi, Rekha Patil

Share this Article
Top