期刊名称:International Journal of Computer Science and Network Security
印刷版ISSN:1738-7906
出版年度:2021
卷号:21
期号:5
页码:168-174
DOI:10.22937/IJCSNS.2021.21.5.24
出版社:International Journal of Computer Science and Network Security
摘要:The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user’s bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information’s such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.