The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-Hoc Networks
Title | The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-Hoc Networks |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Mapunya, Sekgoari, Velempini, Mthulisi |
Conference Name | 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC) |
ISBN Number | 978-1-5386-6477-3 |
Keywords | Ad hoc networks, attack-proof cooperative spectrum sensing, byzantine attack, byzantine attack mitigation scheme, Cascading style sheets, Cognitive radio, cognitive radio ad-hoc networks, Cognitive Radio Security, Consensus algorithm, cooperative communication, data communications, Interference, legitimate cognitive radios, network leading interference, pubcrawl, Radio spectrum, radio spectrum management, radio spectrums, resilience, Resiliency, security, security measure, Sensors, signal detection, spectrum bands, spectrum congestion, telecommunication security, underutilized spectrum, wireless network systems |
Abstract | The ever-increasing number of wireless network systems brought a problem of spectrum congestion leading to slow data communications. All of the radio spectrums are allocated to different users, services and applications. Hence studies have shown that some of those spectrum bands are underutilized while others are congested. Cognitive radio concept has evolved to solve the problem of spectrum congestion by allowing cognitive users to opportunistically utilize the underutilized spectrum while minimizing interference with other users. Byzantine attack is one of the security issues which threaten the successful deployment of this technology. Byzantine attack is compromised cognitive radios which relay falsified data about the availability of the spectrum to other legitimate cognitive radios in the network leading interference. In this paper we are proposing a security measure to thwart the effect caused by these attacks and compared it to Attack-Proof Cooperative Spectrum Sensing. |
URL | https://ieeexplore.ieee.org/document/8601087 |
DOI | 10.1109/ICONIC.2018.8601087 |
Citation Key | mapunya_design_2018 |
- pubcrawl
- wireless network systems
- underutilized spectrum
- telecommunication security
- spectrum congestion
- spectrum bands
- signal detection
- sensors
- security measure
- security
- Resiliency
- resilience
- radio spectrums
- radio spectrum management
- Radio spectrum
- Ad hoc networks
- network leading interference
- legitimate cognitive radios
- Interference
- data communications
- cooperative communication
- Consensus algorithm
- Cognitive Radio Security
- cognitive radio ad-hoc networks
- cognitive radio
- Cascading style sheets
- byzantine attack mitigation scheme
- byzantine attack
- attack-proof cooperative spectrum sensing