Research Paper | Electronics & Communication Engineering | India | Volume 2 Issue 3, March 2013
Malicious User Detection in Cooperative Environment in Cognitive Radio Networks
Sripriya. N | Geetha Ramani. J
Abstract: Cognitive radio efficiently utilizes the unused spectrum for secondary usage without interfering a primary licensed user. In cooperative environment, a primary licensed user can share spectrum occupancy information with a secondary user to enable dynamic spectrum access. However, a secondary user needs to verify accuracy of the spectrum occupancy information and it comes the legitimate primary users. Without the verification, a malicious user can falsify the spectrum occupancy information. This can result interference to the primary users and minimize available spectrum for the secondary usage. Proposed technique verifies that the source of the spectrum occupancy information is from the legitimate primary user thereby maximizing the spectrum utilization efficiency and minimizing any interference to the primary licensed users.
Keywords: Cognitive Radio, Primary User, Secondary User, Cooperative Spectrum Sensing, Security
Edition: Volume 2 Issue 3, March 2013,
Pages: 71 - 74
How to Cite this Article?
Sripriya. N, Geetha Ramani. J, "Malicious User Detection in Cooperative Environment in Cognitive Radio Networks", International Journal of Science and Research (IJSR), Volume 2 Issue 3, March 2013, pp. 71-74, https://www.ijsr.net/get_abstract.php?paper_id=IJSRON2013526
How to Share this Article?
Similar Articles with Keyword 'Cognitive Radio'
Realization of Smart City Using 5G Cognitive Radio
Lalit Chettri | Syed Sazad 
Survey on Bio-Inspired Approaches for Allocation of Spectrum in Cognitive Radio Sensor Networks
Debashree Brahma | Dr. Swati Swayamsiddha