The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks
Cognitive radio network, which enables dynamic spectrum access, addresses the scarcity of radio spectrum caused by ever-increasing demand for spectrum. Cognitive radio technology ensures the efficient utilisation of underutilised licenced spectrum by secondary users (SU). Secondary users, sense the...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
South African Institute of Computer Scientists and Information Technologists
2019-12-01
|
Series: | South African Computer Journal |
Subjects: | |
Online Access: | https://sacj.cs.uct.ac.za/index.php/sacj/article/view/713 |
_version_ | 1819020070777520128 |
---|---|
author | Sekgoari Semaka Mapunya Mthulisi Velempini |
author_facet | Sekgoari Semaka Mapunya Mthulisi Velempini |
author_sort | Sekgoari Semaka Mapunya |
collection | DOAJ |
description | Cognitive radio network, which enables dynamic spectrum access, addresses the scarcity of radio spectrum caused by ever-increasing demand for spectrum. Cognitive radio technology ensures the efficient utilisation of underutilised licenced spectrum by secondary users (SU). Secondary users, sense the radio environment before utilising the available spectrum to avoiding signal interference. The SU cooperatively sense the spectrum to ensure global view of the network. unfortunately, cooperative sensing is vulnerable to Byzantine attacks whereby SU falsify the spectrum reports for selfish reasons. Hence, this study proposes the implementation of a scheme to combat the effects of Byzantine attack in cognitive radio network. The proposed scheme, known as the extreme studentized cooperative consensus spectrum sensing (ESCCSS), was implemented in an ad hoc cognitive radio networks environment where the use of a data fusion centre (DFC) is not required. Cognitive radio nodes perform their own data fusion making spectrum access decisions. They fuse their own reports with reports from neighbouring nodes. To evaluate the performance of our scheme and its effectiveness in combating the effect of byzantine attack, comparative results are presented. The comparative results show that the ESCCSS outperformed the Attack-Proof Cooperative Spectrum Sensing scheme. |
first_indexed | 2024-12-21T03:45:22Z |
format | Article |
id | doaj.art-8423d01ce068424cb96f1438a7e451ce |
institution | Directory Open Access Journal |
issn | 1015-7999 2313-7835 |
language | English |
last_indexed | 2024-12-21T03:45:22Z |
publishDate | 2019-12-01 |
publisher | South African Institute of Computer Scientists and Information Technologists |
record_format | Article |
series | South African Computer Journal |
spelling | doaj.art-8423d01ce068424cb96f1438a7e451ce2022-12-21T19:17:07ZengSouth African Institute of Computer Scientists and Information TechnologistsSouth African Computer Journal1015-79992313-78352019-12-01312178–194178–19410.18489/sacj.v31i2.713713The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networksSekgoari Semaka Mapunya0Mthulisi Velempini1Department of Computer Science, University of LimpopoDepartment of Computer Science, University of LimpopoCognitive radio network, which enables dynamic spectrum access, addresses the scarcity of radio spectrum caused by ever-increasing demand for spectrum. Cognitive radio technology ensures the efficient utilisation of underutilised licenced spectrum by secondary users (SU). Secondary users, sense the radio environment before utilising the available spectrum to avoiding signal interference. The SU cooperatively sense the spectrum to ensure global view of the network. unfortunately, cooperative sensing is vulnerable to Byzantine attacks whereby SU falsify the spectrum reports for selfish reasons. Hence, this study proposes the implementation of a scheme to combat the effects of Byzantine attack in cognitive radio network. The proposed scheme, known as the extreme studentized cooperative consensus spectrum sensing (ESCCSS), was implemented in an ad hoc cognitive radio networks environment where the use of a data fusion centre (DFC) is not required. Cognitive radio nodes perform their own data fusion making spectrum access decisions. They fuse their own reports with reports from neighbouring nodes. To evaluate the performance of our scheme and its effectiveness in combating the effect of byzantine attack, comparative results are presented. The comparative results show that the ESCCSS outperformed the Attack-Proof Cooperative Spectrum Sensing scheme.https://sacj.cs.uct.ac.za/index.php/sacj/article/view/713byzantine attackcognitive radio networkssecondary users |
spellingShingle | Sekgoari Semaka Mapunya Mthulisi Velempini The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks South African Computer Journal byzantine attack cognitive radio networks secondary users |
title | The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks |
title_full | The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks |
title_fullStr | The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks |
title_full_unstemmed | The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks |
title_short | The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks |
title_sort | design and the implementation of a robust scheme to combat the effect of malicious nodes in cognitive radio ad hoc networks |
topic | byzantine attack cognitive radio networks secondary users |
url | https://sacj.cs.uct.ac.za/index.php/sacj/article/view/713 |
work_keys_str_mv | AT sekgoarisemakamapunya thedesignandtheimplementationofarobustschemetocombattheeffectofmaliciousnodesincognitiveradioadhocnetworks AT mthulisivelempini thedesignandtheimplementationofarobustschemetocombattheeffectofmaliciousnodesincognitiveradioadhocnetworks AT sekgoarisemakamapunya designandtheimplementationofarobustschemetocombattheeffectofmaliciousnodesincognitiveradioadhocnetworks AT mthulisivelempini designandtheimplementationofarobustschemetocombattheeffectofmaliciousnodesincognitiveradioadhocnetworks |