Biblio
Filters: Author is Ezhilarasi, I Evelyn [Clear All Filters]
Threat detection in Cognitive radio networks using SHA-3 algorithm. TENCON 2022 - 2022 IEEE Region 10 Conference (TENCON). :1–6.
.
2022. Cognitive Radio Network makes intelligent use of the spectrum resources. However, spectrum sensing is vulnerable to numerous harmful assaults. To lower the network's performance, hackers attempt to alter the sensed result. In the fusion centre, blockchain technology is used to make broad judgments on spectrum sensing in order to detect and thwart hostile activities. The sensed local results are hashed using the SHA 3 technique. This improves spectrum sensing precision and effectively thwarts harmful attacks. In comparison to other established techniques like equal gain combining, the simulation results demonstrate higher detection probability and sensing precision. Thus, employing Blockchain technology, cognitive radio network security can be significantly enhanced.