The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks

Cognitive radio network, which enables dynamic spectrum access, addresses the scarcity of radio spectrum caused by ever-increasing demand for spectrum. Cognitive radio technology ensures the efficient utilisation of underutilised licenced spectrum by secondary users (SU). Secondary users, sense the...

Full description

Bibliographic Details
Main Authors: Sekgoari Semaka Mapunya, Mthulisi Velempini
Format: Article
Language:English
Published: South African Institute of Computer Scientists and Information Technologists 2019-12-01
Series:South African Computer Journal
Subjects:
Online Access:https://sacj.cs.uct.ac.za/index.php/sacj/article/view/713
_version_ 1819020070777520128
author Sekgoari Semaka Mapunya
Mthulisi Velempini
author_facet Sekgoari Semaka Mapunya
Mthulisi Velempini
author_sort Sekgoari Semaka Mapunya
collection DOAJ
description Cognitive radio network, which enables dynamic spectrum access, addresses the scarcity of radio spectrum caused by ever-increasing demand for spectrum. Cognitive radio technology ensures the efficient utilisation of underutilised licenced spectrum by secondary users (SU). Secondary users, sense the radio environment before utilising the available spectrum to avoiding signal interference. The SU cooperatively sense the spectrum to ensure global view of the network. unfortunately, cooperative sensing is vulnerable to Byzantine attacks whereby SU falsify the spectrum reports for selfish reasons. Hence, this study proposes the implementation of a scheme to combat the effects of Byzantine attack in cognitive radio network. The proposed scheme, known as the extreme studentized cooperative consensus spectrum sensing (ESCCSS), was implemented in an ad hoc cognitive radio networks environment where the use of a data fusion centre (DFC) is not required. Cognitive radio nodes perform their own data fusion making spectrum access decisions. They fuse their own reports with reports from neighbouring nodes. To evaluate the performance of our scheme and its effectiveness in combating the effect of byzantine attack, comparative results are presented. The comparative results show that the ESCCSS outperformed the Attack-Proof Cooperative Spectrum Sensing scheme.
first_indexed 2024-12-21T03:45:22Z
format Article
id doaj.art-8423d01ce068424cb96f1438a7e451ce
institution Directory Open Access Journal
issn 1015-7999
2313-7835
language English
last_indexed 2024-12-21T03:45:22Z
publishDate 2019-12-01
publisher South African Institute of Computer Scientists and Information Technologists
record_format Article
series South African Computer Journal
spelling doaj.art-8423d01ce068424cb96f1438a7e451ce2022-12-21T19:17:07ZengSouth African Institute of Computer Scientists and Information TechnologistsSouth African Computer Journal1015-79992313-78352019-12-01312178–194178–19410.18489/sacj.v31i2.713713The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networksSekgoari Semaka Mapunya0Mthulisi Velempini1Department of Computer Science, University of LimpopoDepartment of Computer Science, University of LimpopoCognitive radio network, which enables dynamic spectrum access, addresses the scarcity of radio spectrum caused by ever-increasing demand for spectrum. Cognitive radio technology ensures the efficient utilisation of underutilised licenced spectrum by secondary users (SU). Secondary users, sense the radio environment before utilising the available spectrum to avoiding signal interference. The SU cooperatively sense the spectrum to ensure global view of the network. unfortunately, cooperative sensing is vulnerable to Byzantine attacks whereby SU falsify the spectrum reports for selfish reasons. Hence, this study proposes the implementation of a scheme to combat the effects of Byzantine attack in cognitive radio network. The proposed scheme, known as the extreme studentized cooperative consensus spectrum sensing (ESCCSS), was implemented in an ad hoc cognitive radio networks environment where the use of a data fusion centre (DFC) is not required. Cognitive radio nodes perform their own data fusion making spectrum access decisions. They fuse their own reports with reports from neighbouring nodes. To evaluate the performance of our scheme and its effectiveness in combating the effect of byzantine attack, comparative results are presented. The comparative results show that the ESCCSS outperformed the Attack-Proof Cooperative Spectrum Sensing scheme.https://sacj.cs.uct.ac.za/index.php/sacj/article/view/713byzantine attackcognitive radio networkssecondary users
spellingShingle Sekgoari Semaka Mapunya
Mthulisi Velempini
The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks
South African Computer Journal
byzantine attack
cognitive radio networks
secondary users
title The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks
title_full The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks
title_fullStr The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks
title_full_unstemmed The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks
title_short The Design and the implementation of a robust scheme to combat the effect of malicious nodes in Cognitive Radio Ad Hoc networks
title_sort design and the implementation of a robust scheme to combat the effect of malicious nodes in cognitive radio ad hoc networks
topic byzantine attack
cognitive radio networks
secondary users
url https://sacj.cs.uct.ac.za/index.php/sacj/article/view/713
work_keys_str_mv AT sekgoarisemakamapunya thedesignandtheimplementationofarobustschemetocombattheeffectofmaliciousnodesincognitiveradioadhocnetworks
AT mthulisivelempini thedesignandtheimplementationofarobustschemetocombattheeffectofmaliciousnodesincognitiveradioadhocnetworks
AT sekgoarisemakamapunya designandtheimplementationofarobustschemetocombattheeffectofmaliciousnodesincognitiveradioadhocnetworks
AT mthulisivelempini designandtheimplementationofarobustschemetocombattheeffectofmaliciousnodesincognitiveradioadhocnetworks