Employing game theory and TDMA protocol to enhance security and manage power consumption in WSNs-based cognitive radio

MS Abdalzaher, O Muta - IEEE Access, 2019 - ieeexplore.ieee.org
The rapid development of wireless sensor networks (WSNs) is a significant incentive to
contribute to vulnerable applications such as cognitive radio (CR). This paper proposes a …

[HTML][HTML] Users emulation attack management in the massive internet of things enabled environment

SD Okegbile, OI Ogunranti - ICT Express, 2020 - Elsevier
Users' emulation attacks are a prominent denial of service attack capable of degrading the
entire performance of the network. In this paper, the detection and control of users' emulation …

[HTML][HTML] Countermeasures for primary user emulation attack: a comprehensive review

N Mishra, S Srivastava, SN Sharan - Wireless Personal Communications, 2020 - Springer
Cognitive radio (CR) is a flexible wireless network that can solve the scarcity and
underutilization problem of the spectrum by permitting unlicensed users to access licensed …

Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things

J Wang, H Pei, R Wang, R Lin… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Cognitive Industrial Internet of Things (CIIoT) permits Secondary Users (SUs) to use the
spectrum bands owned by Primary Users (PUs) opportunistically. However, in the absence …

Defense against SSDF Attack and PUE Attack in CR-Internet of Vehicles (IoVs) for Millimeter Wave Massive MIMO Beamforming Systems

D Pari, J Natarajan - Symmetry, 2022 - mdpi.com
The Internet of Vehicles (IoV) is witnessed to play the leading role in the future of Intelligent
Transportation Systems (ITS). Though many works have focused on IoV improvement, there …

Trust-based Attack Detection under Cognitive Radio Networks

AS Chavan, A Sahu… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
In this project we are proposing basic process efficient ISSDF attack relief strategy for
auxiliary range detection under CRAHN (Cognitive Radio Ad Hoc Network). The proposed …

Trust aware scheme based malicious nodes detection under cooperative spectrum sensing for cognitive radio networks

A Kumar, N Gupta, R Tapwal, J Singh - Adjunct Proceedings of the 2021 …, 2021 - dl.acm.org
Emerging of Cognitive Radio (CR) technology has provided an optimistic solution for the
dearth of the spectrum by improving the spectrum utilization. The opportunistic use of the …

A survey on security threats in cognitive radio networks based on cooperative spectrum sensing

FD Zemo, S Bakkali - International Journal of …, 2024 - inderscienceonline.com
Cognitive radio networks (CRNs) are a technological revolution that allows unlicensed users
(SUs) to opportunistically use the freely licensed spectrum bands of a primary user (PU). To …

Mitigation of primary user emulation attack using a new energy detection method in cognitive radio networks

S Madbushi, MSS Rukmini - Journal of Central South University, 2022 - Springer
A most promising solution to the expansion of spectrum efficiency is cognitive radio (CR)
and this expansion is achieved by permitting the licensed frequency bands to be accessed …

Malicious users control and management in cognitive radio networks with priority queues

SD Okegbile, BT Maharaj… - 2020 IEEE 92nd Vehicular …, 2020 - ieeexplore.ieee.org
Malicious users (MUs) have the tendency to disrupt the activities of honest users in the
network if not properly controlled. In a massive cognitive radio network (CRN) with priority …