Performance analysis for selfish attack detection using coopon technique

2016 International Journal of Latest Trends in Engineering and Technology  
I. INTRODION Cognitive Radio Networks (CRN's) is an intelligent network. To make a better spectrum utilisation cognitive radio adapt to changes in their network. CRN's solve the spectrum shortage problem. It is allowing unlicensed users to use spectrum band of licensed user without interference. Licensed users are known as primary users and un-licensed users are secondary users. Primary user send information through a licensed spectrum band, it mostly only some channel of band is used, others
more » ... d is used, others are empty. These empty channels are used by un-licensed user called secondary user. Secondary users always watch the activities of primary user. They detect the empty channel and occupy the channel without disturbing the primary user. When the primary users are active, the secondary user should release the channel. An Empty channel also known as spectrum holes. IN CR wireless networks numbers of attacks are present namely Primary User Emulation attack (PUE), Selfish Attack, Malicious Attack, Byzantine Attack (i.e., Spectrum Sensing Data Falsification). They cannot offer efficient security. CR attacks are a serious security problem. They significantly degrade the performance of cognitive radio network. In PUE attack, attacker transmits an emulated primary signal during a spectrum sensing interval. If some attackers are performs the PUE attack for its selfish own purpose, called as selfish attacker. CR nodes compete to sense available channels. But some SUs are selfish, and try to occupy all or part of available channels. Usually selfish CR attacks are carried out by sending fake channel information to the neighbouring secondary user. If a SU recognizes the presence of a PU by sensing the signals of the PU, the SU won't use the licensed channels. CR technology is works in two steps. First, for unlicensed secondary users (SU's), it searches for available spectrum bands by a spectrum sensing technology. If the licensed primary user (PU) is not using the spectrum bands then they are considered as available. Second, available channels will be allocated to unlicensed SU's by dynamic signal access behaviour. Whenever the SU is recognise that the PU is present in the CR network, and then they will Abstract-Cognitive radio is one of the wireless based communication technology. This technology is mainly designed to allow the unlicensed users to utilize the maximum bandwidth available in the network. An important consideration to any wireless network is secure communication. In Cognitive radio (CR), the unlicensed users use the maximum available bandwidth. When the spectrum is not used by the licensed primary user, the free channels are allocated for the unlicensed secondary users (SUs). But the problem is that some of the secondary users act selfishly to occupy all the channels. These secondary users are called as selfish attackers. Hence, to detect a selfish attacker COOPON (Cooperative neighbouring cognitive radio Nodes) detection technique is used. The proposed work provides COOPON system which detects multiple selfish attacks and evaluate the detection rate by considering the parameters like selfish secondary user density, number of secondary nodes and number of neighbouring nodes using MATLAB R2012a (version7.14.0.739).
doi:10.21172/1.81.065 fatcat:cbw7frfxprfuvgdp6rfdslt4mu