A cognitive radio Network is an intelligent system that can be configured dynamically. This network automatically detects the available channels in the radio spectrum. According to that it changes the transmission parameters to allow concurrent communication in a given spectrum. But this cognitive network is sensitive to security threats. So, in order to overcome these issues we use intrusion detection system. Actually in the cognitive radio network the idle channels of the primary users are used by the secondary users. The attackers may be external users or secondary users act as a malicious users. To identify the abnormal behavior due to attacks, we propose non-parametric cumulative sum (cusum) as the change point detection algorithm. There are different types of attacks created by the malicious users in the different types of layers. Like other wireless communication systems, a jamming attack is one of the most difficult threats in CRNs. In order to detect the jamming attack, let us consider a simple observation made by a secondary user involving its PDR and SS. Using the non-parametric cusum algorithm suggests that the mean value of the random sequence should be negative during the normal conditions and becomes positive upon a change. This method detects the malicious users but it is not particularly described whether it is a attacker or not. So, we introduce an innovative approach called Fuzzy Decision making system to recognize the attackers exactly. Fuzzy logic is an approach to computing based on "degrees of truth" rather than the usual "true or false" logic on which the modern computer is based. This fuzzy method uses discrete values to distinguish the attackers. Due to the fuzzy decision making we discover accurate attackers.
[1]
Juan Hernández-Serrano,et al.
Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks
,
2011,
Networking Workshops.
[2]
Nei Kato,et al.
A survey of routing attacks in mobile ad hoc networks
,
2007,
IEEE Wireless Communications.
[3]
Sai Shankar Nandagopalan,et al.
IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios
,
2006,
J. Commun..
[4]
Kang G. Shin,et al.
Change-point monitoring for the detection of DoS attacks
,
2004,
IEEE Transactions on Dependable and Secure Computing.
[5]
Miguel Soriano,et al.
Securing cognitive radio networks
,
2010
.
[6]
Athanasios V. Vasilakos,et al.
DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis
,
2010,
IEEE/ACM Transactions on Networking.
[7]
Nei Kato,et al.
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
,
2007,
Int. J. Netw. Secur..
[8]
Kwangsue Chung,et al.
Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi-hop Tactical Networks
,
2012
.