Research Paper on Detection of Multiple Selfish Attack Nodes Using RSA in Cognitive Radio

Cognitive radio (CR) is an opportunistic communication technology designed to utilize the maximum available licensed bandwidth for unlicensed users. Security in cognitive radio network becomes a challenging issue, since more chances are given to attackers by cognitive radio technology compared to general wireless network. A selfish SU broadcasts faked channel allocation information to other neighbouring SUs. It is very important to detect the selfish node and prevent the selfish attack in CR ad-hoc network. Selfish cognitive radio attacks are a serious security problem because they significantly degrade the performance of a cognitive radio network. There is a new selfish attack detection technique, called COOPON (called Cooperative neighbouring cognitive radio Nodes), which is used with multichannel resources by cooperative neighbouring cognitive radio nodes. RSA (Rivest-Shamir-Adleman) algorithm is used for securing sensitive data and for secure data transmission. Using RSA algorithm try to improve the different performance parameters of CR. RSA gives reliable encryption standard compare to other encryption standard.

[1]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[2]  Liang Xiao,et al.  Game-Theoretic Approach against Selfish Attacks in Cognitive Radio Networks , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.

[3]  Gregory Epiphaniou,et al.  Prevention against threats to self co-existence - A novel authentication protocol for cognitive radio networks , 2014, 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC).

[4]  Qijun Gu,et al.  Denial of Service Attacks , 2012 .

[5]  A. C. Sumathi,et al.  Security in cognitive radio networks - a survey , 2012, 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA).

[6]  Xinbing Wang,et al.  Efficient spectrum utilization with selfish secondary users in cognitive radio networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[8]  K. Anish Pon Yamni CREDIT RISK VALUE BASED DETECTION OF MULTIPLE SELFISH NODE ATTACKS IN COGNITIVE RADIO NETWORKS , 2014 .

[9]  Wang Weifang Denial of service attacks in cognitive radio networks , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.

[10]  Do-Hoon Kim,et al.  Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.

[11]  Todd M. Austin,et al.  Fault-based attack of RSA authentication , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).

[13]  Shuai Li,et al.  Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.