2017
DOI: 10.1049/iet-com.2016.0235
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent resource allocation scheme for the cognitive radio network in the presence of primary user emulation attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 24 publications
(25 reference statements)
0
7
0
Order By: Relevance
“…In [12], attackers launch jamming attacks on the control channel of multi-channel ad hoc networks, and so the nodes in the clusters adopt a randomized and distributed scheme based on frequency hopping to establish a new control channel. In [13], a resource allocation scheme is used to provide energy efficiency by selecting legitimate SUs in CRNs in the presence of PUE attacks.…”
Section: B Related Workmentioning
confidence: 99%
“…In [12], attackers launch jamming attacks on the control channel of multi-channel ad hoc networks, and so the nodes in the clusters adopt a randomized and distributed scheme based on frequency hopping to establish a new control channel. In [13], a resource allocation scheme is used to provide energy efficiency by selecting legitimate SUs in CRNs in the presence of PUE attacks.…”
Section: B Related Workmentioning
confidence: 99%
“…An attack is considered strong if it involves a minimal number of adversaries performing minimal operations but causing maximum damage or loss to the PUs and or SUs in the network. A brief summary of these attacks is given in Table 1 [19,[30][31][32][33][34][35][36][37][38][39][40][41][42]. Table 1.…”
Section: Threats On Crnmentioning
confidence: 99%
“…Biased utility attack [33,34] Asynchronous sensing attack [35][36][37][38] Byzantine attack [39] False feedback attack [33] Selfish misbehaviour attack [39,40] SU tweaks parameters of the utility function Network Endo-parasite attack [33,34] Channel Ecto-parasite attack [33,34] Low cost ripple effect attack [33,34] SU attempts to increase the interference Key depletion attack [33,34] High round trip times and frequent retransmissions increase key usage Any attacks against confidentiality, integrity, authentication, non-repudiation, access control, and availability [19,33] Any attacks on below layers from application layer impact adversely on the layer Jellyfish attack [41] Routing information jamming attack [42] Performed in a network layer but affected to the other layers…”
Section: Attacks Propertiesmentioning
confidence: 99%
“…It also took the maximization of the SU's rate as the design object. Furthermore, the works in [16], [17] investigated the energy efficiency (EE) maximization problem by SU selection, power allocation and sensing time assignment in the presence of PUEA. However, the above works did not consider the delay QoS requirement of the SU's practical traffic.…”
Section: Introductionmentioning
confidence: 99%