مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

278
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

110
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

REDUCING ATTACK EFFECTIVENESS IN COGNITIVE RADIO NETWORKS

Pages

  8-12

Abstract

 Cognitive radio is a revolutionary technology that made significant progress in the effective use of the frequency spectrum. The technology itself can be dynamically adjusted so that the proper utilization of the available radio spectrum can be made. According to various studies conducted, it is observed that the bulk of each frequency band allocated to users leaving unused. The cognitive radio can use these parts of the spectrum that called SPECTRUM HOLES.Inherent nature of this technology creates the chance for the attacker in these networks. This vulnerability that created due to the inherent nature of cognitive radio technology, Can severely impact on the safety and quality of service in these networks. In this paper, we focus on the PRIMARY USER emulation attack. In this attack, an adversary transmits signals whose characteristics emulate those of incumbent signals. We proposed the method for reducing the effects of PRIMARY USER EMULATION ATTACKS/fa?page=1&sort=1&ftyp=all&fgrp=all&fyrs=all" target="_blank"> PRIMARY USER EMULATION ATTACKS in COGNITIVE RADIO NETWORKS. This method suggests the technique that can merge with SPECTRUM SENSING method and can resistant these networks against the PRIMARY USER EMULATION ATTACKS/fa?page=1&sort=1&ftyp=all&fgrp=all&fyrs=all" target="_blank"> PRIMARY USER EMULATION ATTACKS. Finally, with run some simulation, we examined the performance of this proposed method in detection of PRIMARY USER EMULATION ATTACKS/fa?page=1&sort=1&ftyp=all&fgrp=all&fyrs=all" target="_blank"> PRIMARY USER EMULATION ATTACKS in these networks.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    RAZAVI, PARASTOO, & BERANGI, REZA. (2012). REDUCING ATTACK EFFECTIVENESS IN COGNITIVE RADIO NETWORKS. MAJLESI JOURNAL OF ELECTRICAL ENGINEERING, 6(4 (23)), 8-12. SID. https://sid.ir/paper/634585/en

    Vancouver: Copy

    RAZAVI PARASTOO, BERANGI REZA. REDUCING ATTACK EFFECTIVENESS IN COGNITIVE RADIO NETWORKS. MAJLESI JOURNAL OF ELECTRICAL ENGINEERING[Internet]. 2012;6(4 (23)):8-12. Available from: https://sid.ir/paper/634585/en

    IEEE: Copy

    PARASTOO RAZAVI, and REZA BERANGI, “REDUCING ATTACK EFFECTIVENESS IN COGNITIVE RADIO NETWORKS,” MAJLESI JOURNAL OF ELECTRICAL ENGINEERING, vol. 6, no. 4 (23), pp. 8–12, 2012, [Online]. Available: https://sid.ir/paper/634585/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button