DocumentCode
675702
Title
Mitigating the Effect of Malicious Users in Cognitive Networks
Author
Aisha, Ain Ul ; Qadir, Junaid ; Baig, Adeel
Author_Institution
Sch. of Electr. Eng. & Comput. Sci., Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
fYear
2013
fDate
16-18 Dec. 2013
Firstpage
7
Lastpage
12
Abstract
Open medium access is an inherent feature of wireless networks that makes them vulnerable to security threats and unauthorized access by foreign entities and malicious users. In cognitive radio networks, effect of these malicious users on network performance becomes more threatening, where they impersonate primary users by emitting similar signals, causing secondary users to vacate the occupied channel needlessly. As a result, network resources are unfairly monopolized by malicious users denying other secondary users their fair share. In this paper, we introduce a cross-layered approach to provide secondary users the ability to differentiate between a primary user and a malicious user, using Hidden Markov Model at MAC layer. Hence, our proposed framework allows the transport layer protocol to respond appropriately in a way that the effect of the presence of malicious user on the network is mitigated. The effectiveness of our proposed approach is shown by calculating the throughput of the network and number of channel switches with respect to varying number of secondary and malicious nodes and by comparing it to an earlier proposed TCP protocol.
Keywords
access protocols; cognitive radio; computer network security; hidden Markov models; transport protocols; wireless channels; MAC layer; TCP protocol; channel switches; cognitive radio network; cross-layered approach; hidden Markov model; malicious node; open medium access; security threat; transport layer protocol; wireless channel; wireless network; Adaptation models; Cognitive radio; Hidden Markov models; Protocols; Throughput; Training; Wireless networks; cognitive radio networks; cross layer design; security; transport layer protocol;
fLanguage
English
Publisher
ieee
Conference_Titel
Frontiers of Information Technology (FIT), 2013 11th International Conference on
Conference_Location
Islamabad
Print_ISBN
978-1-4799-2293-2
Type
conf
DOI
10.1109/FIT.2013.9
Filename
6717217
Link To Document