Devasahayam Joseph Jeyakumar
J.N.N Institute of Engineering

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

Hermitan matrices based malicious cognitive radio detection and bayesian method for detecting primary user emulation attack Devasahayam Joseph Jeyakumar; Boominathan Shanmathi; Parappurathu Bahulayan Smitha; Sekar Vinurajkumar; Mohanan Murali; Muthuraj Mariselvam
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp956-964

Abstract

Cognitive radio (CR) is a facilitating technology to efficiently deal with the spectrum scarceness, and it will significantly enhance the spectrum deployment of upcoming wireless transmission method. Security is a significant concern, although not well tackle in cognitive radio networks (CRN). In CR networks, this approach regard as a security issue happen from primary user emulation attack (PUEA). A PUEA attacker forwards an emulated primary signal and defraud the CR users to avoid them from accessing spectrum holes. Here, we introduce a Hermitan matrices based malicious cognitive radio (CMCR) detection and Bayesian method for detecting PUEA attack in the CRN. In this approach, the Bayesian method is used for detecting the PUEA attack. The trust analyzer evaluates the CR trust. Here, the node trust value is computed by node activeness and inactiveness, degree of data transmission, and hermitan matrics verification. In addition, the Hermitan Matrices method is used to detect the malicious CR user in the CRN. The simulation outcomes propose that the CMCR leads to improve the performance in terms of better detection ratio, minimized the possibility of miss detection ratio. Furthermore, it minimized the possibility of false alarm in the CRN.