Analysis of reliability based algorithm for cognitive networks

Nowadays when everyone is busy using mobile devices. There are various risk involved in using mobile devices. Every communication these days are based on mobile devices. Reliability is the greatest factor. Based on reliability we have proposed reliability-based algorithm. The reliability algorithm is used to achieve the trust over the risk involved in various mobile devices. It ensures to achieve integrity, confidentiality, availability, non-repudiation and access services in cognitive networks.

[1]  R. Chandramouli,et al.  Pricing for Security and QoS in Cognitive Radio Networks , 2016 .

[2]  Garimella Rama Murthy,et al.  Doubly Cognitive Architecture Based Cognitive Wireless Sensor Networks , 2011, Int. J. Wirel. Networks Broadband Technol..

[3]  Vahid Rafe,et al.  A security framework for developing service-oriented software architectures , 2015, Secur. Commun. Networks.

[4]  Chang-Tien Lu,et al.  Non-parametric passive traffic monitoring in cognitive radio networks , 2013, 2013 Proceedings IEEE INFOCOM.

[5]  Mohamed Aymen Chalouf,et al.  PHY/MAC signalling protocols for resilient cognitive radio networks , 2014, 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[6]  John Strassner The Role of Autonomic Networking in Cognitive Networks , 2007 .

[7]  C. N. Mathur,et al.  Security Issues in Cognitive Radio Networks , 2007 .

[8]  Mehdi Hosseinzadeh,et al.  Quantum-resistance authentication in centralized cognitive radio networks , 2016, Secur. Commun. Networks.

[9]  Hossein Saiedian,et al.  A survey of client-side Web threats and counter-threat measures , 2012, Secur. Commun. Networks.

[10]  Mukesh Kumar,et al.  A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks , 2015 .

[11]  Wu Wei The research of cognitive communication networks , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[12]  Lokesh Chouhan,et al.  Security for Cognitive Radio Networks , 2013 .

[13]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[14]  Jaydip Sen,et al.  Security and Privacy Challenges in Cognitive Wireless Sensor Networks , 2013, ArXiv.

[15]  Hsiao-Hwa Chen,et al.  Cognitive Radio Networks: Architectures, Protocols, and Standards , 2010 .

[16]  Iti Saha Misra,et al.  VoIP based two-tier Cognitive Radio Network: Developing implementation techniques , 2013, 2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT).

[17]  J. Herrera-Joancomartí,et al.  Security and Privacy Concerns About the RFID Layer of EPC Gen 2 Networks , 2014 .

[18]  Mark Michael Physical Security Threats and Measures , 2012 .

[19]  Zhiqiang Li,et al.  Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks , 2012, IET Commun..