BSMACRN: Design of an efficient Blockchain-based Security Model for improving Attack-resilience of Cognitive Radio Ad-hoc Networks

D Dansana, PK Behera, SGK Patro, QN Naveed… - IEEE …, 2024 - ieeexplore.ieee.org
Cognitive Radio Ad-hoc Networks (CRAHNs) are under constant attacks from compromised
primary & secondary nodes. These attacks focus on bandwidth manipulation, internal …

An Overview of Security Issues in Cognitive Radio Ad Hoc Networks

N Islam, MF Zia, D Syed - … and Considerations on the Evolution of …, 2023 - igi-global.com
Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It
combines the advantages of cognitive radio networks and mobile ad hoc networks. This …

Improving Performance of Electronic Healthcare Record Management Systems (EHRMS) using Low Complexity Blockchain

NK Rout, D Dansana, N Parida… - … on Computer Science …, 2022 - ieeexplore.ieee.org
Electronic health record (EHR) security is a multidomain job that includes authentication,
privacy protection, document storage security, etc. Trusted access control requires …

Intensify cloud security and privacy against phishing attacks

VK Prasad, D Dansana, BK Mishra… - ECS Transactions, 2022 - iopscience.iop.org
Cloud computing encompasses the products supplied as services over the Internet and the
computer applications that power the data centers that deliver such services. Software as a …

Optimal Detection Technique for Primary User Emulator in Cognitive Radio Network

G Olaleru, H Ohize, AS Mohammed… - 2021 1st International …, 2021 - ieeexplore.ieee.org
The primary user emulation attack (PUEA) is one of the most common attacks affecting the
physical layer of the cognitive radio network (CRN). In this attack, a malicious user or a …

[PDF][PDF] Intensify Cloud Security and Privacy Against Phishing Attacks

EA Mityukov, AV Zatonsky, PV Plekhov, A Fajar… - researchgate.net
Cloud computing encompasses the products supplied as services over the Internet and the
computer applications that power the data centers that deliver such services. Software as a …

[PDF][PDF] Grace Olaleru1 Department of Electrical and Electronics Engineering, Federal University of Technology, Minna, Minna, Nigeria.

US Dauda - academia.edu
The primary user emulation attack (PUEA) is one of the most common attacks affecting the
physical layer of the cognitive radio network (CRN). In this attack, a malicious user or a …

[引用][C] Optimal Detection Technique for Primary User Emulator in Cognitive Radio Network

AS Mohammed, G Olaleru, H Ohize, US Dauda - 2021 - (IEEE-ICMEAS 2021)