International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014


Modified Belief Propagation-Based Defense against Routing Toward Primary User Attack in Cognitive Radio Networks

Dhanashree Yogesh Jangam | Aruna K. Gupta [2]


Abstract: Current wireless networks are characterized by a static spectrum allocation policy, where governmental agencies assign wireless spectrum to license holders on a long term basis for large geographical regions ISM band has enabled the explosion of new technologies that is Wi-Fi due to this its license is free from characteristic. The widespreadadoption of Wi-Fi technology, combined with the rapid penetration of smart phonesrunning popular user services has overcrowded substantially the ISM band. Cognitive radio (CR) networks have involved many attentions newly, whilethe security issues are not yet studied fully. In this approach, propose a new and powerfulnetwork layer attack called routing-toward-primary-user (RPU) attack in Cognitive Radio networks. In this attack malicious nodes intentionally route a large amount of packets In this approach, suggest a new and powerful network layer attack called routing toward-primary-user (RPU) attack in Cognitive Radio networks. In this attack malicious nodes intentionally route a large amount of packets toward the primary users (PUs), purpose of malicious node is to cause interference to the PUs and to increase delay in thedata transmission among the secondary users. The main objective of the proposed work is to minimize the time for sendingthe data, and send the data by the path which is the longest distance from the primaryuser network. For that the pre belief value is calculated. , belief propagation used to develop a defense strategy. Here a initial rout establish from source to destination, then according to it the each node keeps a feedback of other node on the route, compute belief, exchanges of feedback in a table record. On the basis of final belief values, the source node detects the malicious path.


Keywords: Belief propagation, Cognitive, Modified BP, Radio Network, Routing toward primary user attack, security


Edition: Volume 3 Issue 7, July 2014,


Pages: 866 - 871


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Dhanashree Yogesh Jangam, Aruna K. Gupta, "Modified Belief Propagation-Based Defense against Routing Toward Primary User Attack in Cognitive Radio Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 866-871, https://www.ijsr.net/get_abstract.php?paper_id=20141174

Similar Articles with Keyword 'Cognitive'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 672 - 675

Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio

Shashank Dhananjaya | Yuvaraju B N

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 9, September 2023

Pages: 1263 - 1266

Neuralink: Spearheading the Point of Interaction among Brain and Machine

Ahdil Singh | Vikas Kumar [11]

Share this Article
Top