Improving Security Rate with Cognitive Radio Networks Using Cooperative Secure Resource Allocation
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
A secure communication in cognitive radio networks, where the secondary users are allowed to access the spectrum of the primary users as long as they preserve the secure communication of PU in the presence of malicious eavesdroppers. The secondary users will uses the two hops in which the secondary user will act as a relay set and the friendly jammer for the primary user and the eavesdroppers. In this new setup, the time duration for each hop, the power transmissions of all nodes in CRN, and relay selection at the second hop are allocated in such a way that the secrecy rate of the SU is maximized subject to the minimum required PU’s secrecy rate. I use the digital signature algorithm for wireless system and optimize the power allocation, time allocation and relay selection problems. I also provide an intrusion detection system to detect the users who act as a false transmitter or receiver. The power allocation problem can be transformed into generalized geometric programming (GGP) model via scaled algorithm and it can be solved very efficiently.
Authors and Affiliations
Saranya M, Vinayagam T. A, Divya M
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols in MANET Using OPNET Modeler
This Mobile Ad hoc Networks (MANET) is a set of wireless mobile nodes dynamically form spontaneous network which works without centralized administration. Due to this characteristic, there are some challenges that proto...
Forensic Analysis of the Saffron: Rapid Authenticity Testing
Saffron is the valuable spice of our food. It is the dried stigma of the flower Crocus sativus Linnaeus, the most economic part of the plant. Due to its high price and demand throughout world, it became frequent object...
Extended Cryptographic Mechanism for Secure and Scalable Data Sharing in Cloud using Multiple Keys
Cloud computing technology is widely used now-a-days. Data sharing is an important functionality in cloud storage. Data can be outsourced on cloud and can access easily. Different users can share that data through diffe...
Speed Control of Brushless DC Motor Using Proportional Integral Controller
Ease control and high power density are the two main reasons for using brushless DC motor in wide range of industrial applications. In general the brushless DC motors are controlled using power Semiconductor bridge. So...
Behavioural Comparison of Geometrically Different Steel Plate Shear Walls
Steel Plate Shear Walls (SPSWs) have been used as efficient and widely constructed primary lateral force resisting system particularly in areas of high seismic hazard in several modern and important structures. Signific...