Improving Security Rate with Cognitive Radio Networks Using Cooperative Secure Resource Allocation
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
A secure communication in cognitive radio networks, where the secondary users are allowed to access the spectrum of the primary users as long as they preserve the secure communication of PU in the presence of malicious eavesdroppers. The secondary users will uses the two hops in which the secondary user will act as a relay set and the friendly jammer for the primary user and the eavesdroppers. In this new setup, the time duration for each hop, the power transmissions of all nodes in CRN, and relay selection at the second hop are allocated in such a way that the secrecy rate of the SU is maximized subject to the minimum required PU’s secrecy rate. I use the digital signature algorithm for wireless system and optimize the power allocation, time allocation and relay selection problems. I also provide an intrusion detection system to detect the users who act as a false transmitter or receiver. The power allocation problem can be transformed into generalized geometric programming (GGP) model via scaled algorithm and it can be solved very efficiently.
Authors and Affiliations
Saranya M, Vinayagam T. A, Divya M
Investigation on Fluid Flow and Heat Transfer Characteristics of Pin-Fin Arrays
This is article presents the results of an experimental ‘investigation on fluid flow and heat transfer characteristics of pin-fin arrays’. In the past few decades, this topic has generated a keen interest because of its...
LED Based Energy Efficient Wireless Street Light Control and Monitoring System
Lighting systems, particularly within the public sector, are still designed per the previous standards of reliability and that they don't usually profit of latest technological developments. Use of renewable energy sour...
Design and VLSI Implementation of 8-Bit Pipelined ADC Using Cadence 180nm Technology
Analog-to-Digital converters (ADC) are key building blocks of analog and mixed signal processing that link the natural world of analog signals and the world of digital processing. Applications such as wireless communica...
A review on Cloud Computing Security issues and Threat
Cloud computing is a combination of traditional technology of computing and various other technologies such as parallel computing, distributed computing etc. The major goal is to achieve a complete system having capabil...
A Survey on ZIGBEE Wireless Networks
ZigBee is an emerging worldwide standard for wireless personal area network. The main aim is to provide lowpower, cost effective, flexible, reliable, secure and scalable. It is totally different from the other personal a...