Advertisement

Attacks and Their Solution at Data Link Layer in Cognitive Radio Networks

  • Gurjit KaurEmail author
  • Pradeep Tomar
  • Archit Agrawal
  • Prabhjot Singh
Conference paper
  • 217 Downloads
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 141)

Abstract

In this research paper, the author proposes a new protocol which improves channel assignment as well as it detects the malicious nodes efficiently. We have designed a protocol to enhance the detection ratio by discarding malicious nodes from further detection. In the first proposal, the malicious node is determined by comparing the number of used and unused channel reported by target node as well as by cooperating neighboring nodes. Any mismatch for channel assignment leads to the determination of selfish nodes. In the second proposal, malicious nodes are determined by maintaining the data set which keeps the record of a number of channels being used by each node. Each node has a unique identity and this unique identity is linked with allocated frequency. If malicious node requests multiple channels then it can be identified by checking the data set. Malicious nodes holding multiple channels have to leave the channel and this channel is allocated to other secondary users, it also creates equilibrium in the network. Performance of the proposed work is determined in terms of detection ratio, throughput, and BER. Further, BER is determined for different modulation techniques FSK, PSK, and DPSK.

Keywords

Primary user (PU) Secondary user (SU) Malicious node Detection ratio Throughput 

References

  1. 1.
    Abbagnale, A., Cuomo, F.: Gymkhana: a connectivity based routing scheme for cognitive radio ad-hoc networks. In: Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Work-in-progress session, San Diego, CA, USA (2010)Google Scholar
  2. 2.
    Attar, A., Holland, O., Nakhai, M., Aghvami, A.: Interference-limited resource allocation for cognitive radio in orthogonal frequency-division multiplexing networks. IET Commun. 2, 806–814 (2008)CrossRefGoogle Scholar
  3. 3.
    Wang, B., Ray Liu, K.J.: Advances in cognitive radio networks: a survey. IEEE J. Sel. Top. Signal Process. 5(1) (2011)Google Scholar
  4. 4.
    Zuo, C., Xiong, C., Zhang, H., Fang, C.: Graph coloring based channel assignment framework for rural wireless mesh networks. J. Electron. (China) 30(5), 436–446 (2013)CrossRefGoogle Scholar
  5. 5.
    Ahmed, E., Yao, L.J., Shiraz, M., Gani, A., Ali, S.: Fuzzy based spectrum handoff and channel selection for cognitive radio networks. In: Proceedings of International Conference on Computer, Control, Informatics and Its Applications (IC3INA), 2013, pp. 23–28. IEEE (2013)Google Scholar
  6. 6.
    Ahmed, E., Shiraz, M., Gani, A.: Spectrum-aware distributed channel assignment for cognitive radio wireless mesh networks. Malays. J. Comput. Sci. 26(3), 232–250 (2013)Google Scholar
  7. 7.
    Skalli, H., Ghosh, S., Das, S.K., Lenzini, L., Conti, M.: Channel assignment strategies for multiradio wireless mesh networks: issues and solutions. IEEE Commun. Mag. 45(11), 86–95 (2007)CrossRefGoogle Scholar
  8. 8.
    Akyildiz, I.F., Lee, W.-Y., Chowdhury, K.: CRAHNs: cognitive radio ad hoc networks. Ad Hoc Netw. J. (Elsevier) 7(5), 810–836 (2009)CrossRefGoogle Scholar
  9. 9.
    Akyildiz, I.F., Lee, W.-Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput. Netw. J. (Elsevier) 50, 2127–2159 (2006)CrossRefGoogle Scholar
  10. 10.
    Laneman, J.N., Tse, D.N.C., Wornell, G.W.: Cooperative diversity in wireless networks: efficient protocols and outage behaviour. IEEE Trans. Inf. Theory 50(12), 3062–3080 (2004)CrossRefGoogle Scholar
  11. 11.
    Mitola, J.: Cognitive radio architecture evolution. Proc. IEEE 626–641 (2009)CrossRefGoogle Scholar
  12. 12.
    Cheng Howa, K., Maa, M., Qin, Y.: An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors. Comput. Netw. 56(7), 2068–2079 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Gurjit Kaur
    • 1
    Email author
  • Pradeep Tomar
    • 2
  • Archit Agrawal
    • 2
  • Prabhjot Singh
    • 3
  1. 1.Department of Electronics and Communication EngineeringDelhi Technological UniversityNew DelhiIndia
  2. 2.School of Information and Communication TechnologyGautam Buddha UniversityGreater NoidaIndia
  3. 3.Sales ForceSan FranciscoUSA

Personalised recommendations