Abstract
One of most emerging technology in the recent years in the field of wireless communication is the Cognitive Radio (CR) technology, which reduces spectrum scarcity significantly. The main function of CR technology is detecting spectrum holes or unused spectrum of primary users (PUs), also called as licensed users, and assigning this unused spectrum to the secondary users (SUs), also called unlicensed users. As the CR technology is open to every user, there are many security issues such as Primary User Emulsion Attack (PUEA), Jamming Attack, Spectrum Sensing Data Falsification (SSDF) Attack, Lion Attack, and Sink Hole Attack and so on. SSDF attack is the one of major security attack in cognitive radio in which a malicious user sends false data intentionally to the other secondary users. The main aim of the SSDF attack is to disturb the communication between the secondary users or to gain more channel resources. One of the solutions to mitigating SSDF attack is the cooperative spectrum sensing. In this paper, we propose a new algorithm of cooperative sensing based on trust values of secondary users, and compares with the conventional cooperative spectrum sensing with the proposed algorithm. The simulation of cooperative sensing also performed in both time variant channel and time invariant (Rayleigh) channel. The authors also compare the three basic hard fusion techniques such as AND, OR, MAJORITY rule
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.