• DocumentCode
    675702
  • Title

    Mitigating the Effect of Malicious Users in Cognitive Networks

  • Author

    Aisha, Ain Ul ; Qadir, Junaid ; Baig, Adeel

  • Author_Institution
    Sch. of Electr. Eng. & Comput. Sci., Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
  • fYear
    2013
  • fDate
    16-18 Dec. 2013
  • Firstpage
    7
  • Lastpage
    12
  • Abstract
    Open medium access is an inherent feature of wireless networks that makes them vulnerable to security threats and unauthorized access by foreign entities and malicious users. In cognitive radio networks, effect of these malicious users on network performance becomes more threatening, where they impersonate primary users by emitting similar signals, causing secondary users to vacate the occupied channel needlessly. As a result, network resources are unfairly monopolized by malicious users denying other secondary users their fair share. In this paper, we introduce a cross-layered approach to provide secondary users the ability to differentiate between a primary user and a malicious user, using Hidden Markov Model at MAC layer. Hence, our proposed framework allows the transport layer protocol to respond appropriately in a way that the effect of the presence of malicious user on the network is mitigated. The effectiveness of our proposed approach is shown by calculating the throughput of the network and number of channel switches with respect to varying number of secondary and malicious nodes and by comparing it to an earlier proposed TCP protocol.
  • Keywords
    access protocols; cognitive radio; computer network security; hidden Markov models; transport protocols; wireless channels; MAC layer; TCP protocol; channel switches; cognitive radio network; cross-layered approach; hidden Markov model; malicious node; open medium access; security threat; transport layer protocol; wireless channel; wireless network; Adaptation models; Cognitive radio; Hidden Markov models; Protocols; Throughput; Training; Wireless networks; cognitive radio networks; cross layer design; security; transport layer protocol;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Frontiers of Information Technology (FIT), 2013 11th International Conference on
  • Conference_Location
    Islamabad
  • Print_ISBN
    978-1-4799-2293-2
  • Type

    conf

  • DOI
    10.1109/FIT.2013.9
  • Filename
    6717217