首页    期刊浏览 2024年11月13日 星期三
登录注册

文章基本信息

  • 标题:Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks
  • 本地全文:下载
  • 作者:Reshma C R. ; Arun kumar B. R
  • 期刊名称:International Journal of Computer Science and Network Security
  • 印刷版ISSN:1738-7906
  • 出版年度:2021
  • 卷号:21
  • 期号:5
  • 页码:168-174
  • DOI:10.22937/IJCSNS.2021.21.5.24
  • 出版社:International Journal of Computer Science and Network Security
  • 摘要:The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user’s bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information’s such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.
  • 关键词:malicious user; security; attacks; threats; cryptography
国家哲学社会科学文献中心版权所有