International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 125

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 4 Issue 8, August 2015


Malicious User Detection in Cognitive Radio Networks

Jithesh M | Harish Kumar C H


Abstract: The issue of spectrum underutilization in wire-less communication can be solved in a better way using Cognitive radio (CR) technology. Since cognitive radio networks (CRNs) are basically wireless networks, they inherit most of the well known security threats of wireless systems. Cooperative spectrum sensing is vulnerable to security attacks from malicious users. FastProbe algorithm efficiently detects the malicious users present in the system. If a malicious user exist in CR network, the entire operation of the network gets disturbed and to preclude such malicious behavior, some security solutions must be needed. In this paper, malicious users in CRNs are detected and then defends such behavior. Security solutions are presented which are used in furnishing a secure and reliable communication in cognitive radio networks. Elliptic Curve Cryptography (ECC) is used for the security in the CR network. ECC key sizes are shorter when comparable to RSA keys, the length of the public key and private key is much shorter in elliptic curve cryptosystems. This results into faster processing times, and lower demands on memory and bandwidth.


Keywords: Cognitive radio networks CRNs, Elliptic curve cryptography ECC, Malicious users MUs, Primary User Emulation PUE, Secondary User SU


Edition: Volume 4 Issue 8, August 2015,


Pages: 496 - 501


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Jithesh M, Harish Kumar C H, "Malicious User Detection in Cognitive Radio Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 8, August 2015, pp. 496-501, https://www.ijsr.net/get_abstract.php?paper_id=SUB157360

Similar Articles with Keyword 'Secondary User SU'

Downloads: 111

Review Papers, Electronics & Communication Engineering, Sudan, Volume 3 Issue 9, September 2014

Pages: 806 - 808

Cognitive Radio Network ? Review

Rayan Nabil Hassan Abd Elrahman [2] | Dr. Khalid Hamid [4]

Share this Article

Downloads: 112

Research Paper, Electronics & Communication Engineering, Sudan, Volume 3 Issue 9, September 2014

Pages: 800 - 805

Adaptation of Cognitive Radio Network

Rayan Nabil Hassan Abd Elrahman [2] | Dr. Khalid Hamid [4]

Share this Article
Top