Title | Threat detection in Cognitive radio networks using SHA-3 algorithm |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Ezhilarasi, I Evelyn, Clement, J Christopher |
Conference Name | TENCON 2022 - 2022 IEEE Region 10 Conference (TENCON) |
Keywords | blockchain, blockchains, Cognitive radio, Cognitive Radio Network, Cognitive Radio Security, diversity reception, malicious users, pubcrawl, reliability, Resiliency, Secure Hash Algorithm 3, security, Sensors, simulation, spectrum sensing |
Abstract | Cognitive Radio Network makes intelligent use of the spectrum resources. However, spectrum sensing is vulnerable to numerous harmful assaults. To lower the network's performance, hackers attempt to alter the sensed result. In the fusion centre, blockchain technology is used to make broad judgments on spectrum sensing in order to detect and thwart hostile activities. The sensed local results are hashed using the SHA 3 technique. This improves spectrum sensing precision and effectively thwarts harmful attacks. In comparison to other established techniques like equal gain combining, the simulation results demonstrate higher detection probability and sensing precision. Thus, employing Blockchain technology, cognitive radio network security can be significantly enhanced. |
DOI | 10.1109/TENCON55691.2022.9977985 |
Citation Key | ezhilarasi_threat_2022 |