Malicious Node Detection in Cognitive Radio using Fuzzy Weighted Trust Evaluation

Publish Year: 1390
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,156

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

این Paper در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

SASTECH05_228

تاریخ نمایه سازی: 22 مرداد 1391

Abstract:

With increasing demand for wireless communication, efficient utilization of spectrum becomes very important. Cognitive radio is a new approach for improving the spectrum utilization by making it possible for secondary (unlicensed) users to access spectrum band when primary (licensed) user is absent. Spectrum sensing is one of the most important tasks in cognitive radio networks. Cooperation among secondary unlicensed users will increase probability of primary licensed user detection. In cooperative sensing, malicious nodes send false information to fusion center, which degrade performance of the system. To reduce the effects of malicious nodes, several detection techniques have been proposed. In most of these techniques, the fading effects have been ignored. In this paper, we introduce new trust factors to be assigned to the nodes for nullifying the effects of malicious nodes in final decision, considering fading effects. In our proposed method, we use fuzzy logic for computing the suspicious level of the nodes. Simulation results show that our proposed method can introduce more improvement of performance compared with previous works

Authors

Ehsan MoeenTaghavi

Iran University of Science & Technology

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. Anand, Z. Jin, and K.P. Subbalakshm _ Mitigating primary ...
  • I. F. Akyildiz, W. Lee, M. C. Vuran, and S. ...
  • ac cess/cognitive radio wireles networks: A survey, " Elsevier Jl. ...
  • A. Ghasemi, E. S. Sousa. "Collaboratie spectrum sensing for opportunistic ...
  • S. Xu, Y. Shang, H. Wang, "Double thresholds based cooperative ...
  • P. Kaligineedi, M. Khabbazian, V.K. Bhargava, "Secure cooperative sensing techniques ...
  • W. Wang, H. Li, Y. Sun, Z. Han, "Attack-Proof collaborative ...
  • N. Nhan, I. Koo, _ A Secure distributed spectrum sensing ...
  • E. MoeenTaghavi, B. Abolhassani, "Trustworthy node detection in cognitive radio ...
  • P. Kaligineedi, M. Khabbazian, V.K. Bhargava, "Malicious user detection in ...
  • El-Hajj, W.; Aloul., F.; Trabelsi, Z.; Zaki, N. _ On ...
  • نمایش کامل مراجع