Abstract
Cognitive Radio (CR) technology has been developed to overcome the scarcity of spectrum due to the rapid development of wireless networks. Spectrum is dynamically distributed in perceptual radio networks, thus increasing spectrum usage and increasing attacks, including eavesdropping. There are two types of eavesdropping attacks i) passive attacks that monitor transmissions and the second type ii) active attacks make modify the message. Data is protected from eavesdropping attacks in two ways. The primary user is protected from passive eavesdropping attacks by allowing only secondary users they know to use empty channels; However, any external user who does not know it is considered an attack, and they are not allowed to use the empty channel; The second method uses chaotic encryption where messages are encrypted before sending. Hence, the security of the cognitive radio network is one of the most focused and interesting topics. The results obtained in the first method by preventing unauthorized users from using the spectrum showed how the passive eavesdropping attack was prevented and the cognitive radio network protected. In the second method, the attack’s chaotic encryption appears as external noise and is sensitive to the direction of the initial changes. So the effectiveness of the encryption process and message protection is confirmed.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.