SciELO - Scientific Electronic Library Online

 
vol.31 issue2 author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Article

Indicators

Related links

  • On index processCited by Google
  • On index processSimilars in Google

Share


South African Computer Journal

On-line version ISSN 2313-7835
Print version ISSN 1015-7999

Abstract

MAPUNYA, Sekgoari Semaka  and  VELEMPINI, Mthulisi. The design and implementation of a robust scheme to combat the effect of malicious nodes in cognitive radio ad hoc networks. SACJ [online]. 2019, vol.31, n.2, pp.178-194. ISSN 2313-7835.  http://dx.doi.org/10.18489/sacj.v31i2.713.

A cognitive radio network, which enables dynamic spectrum access, addresses the scarcity of radio spectrum caused by ever-increasing demand for spectrum. Cognitive radio technology ensures the efficient utilisation of underutilised licenced spectrum by secondary users (SUs). SUs sense the radio environment before utilising the available spectrum to avoid signal interference. The SUs cooperatively sense the spectrum to ensure a global view of the network. Unfortunately, cooperative sensing is vulnerable to Byzantine attacks whereby SUs falsify the spectrum reports for selfish reasons. Hence, this study proposes the implementation of a scheme to combat the effects of Byzantine attack in cognitive radio networks. The proposed scheme, known as the extreme studentized cooperative consensus spectrum sensing (ESCCSS), was implemented in an ad hoc cognitive radio network environment where the use of a data fusion centre (DFC) is not required. Cognitive radio nodes perform their own data fusion before making spectrum access decisions. They fuse their own reports with reports from neighbouring nodes. To evaluate the performance of our scheme and its effectiveness in combating the effect of Byzantine attack, comparative results are presented. The comparative results show that the ESCCSS outperformed the Attack-Proof Cooperative Spectrum Sensing scheme.CATEGORIES: · Networks ~ Network security · Networks ~ Ad hoc networks

Keywords : byzantine attack; cognitive radio networks; secondary users.

        · text in English     · English ( pdf )

 

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License