作者
AC Sumathi, R Vidhyapriya, C Kiruthika
发表日期
2015/1/8
研讨会论文
2015 International Conference on Computer Communication and Informatics (ICCCI)
页码范围
1-7
出版商
IEEE
简介
In cognitive radio network, secondary users (without license) are allowed to access the licensed spectrum if primary users (having license) are not present. A serious threat in physical layer of this network is that a malicious secondary user exploiting the spectrum access etiquette by mimicking the spectral characteristics of a primary user known as Primary User Emulation Attack (PUEA). The main objective of this paper is to eliminate the PUE attack that may arise from one of the secondary users. We propose our Intense Explore algorithm to eliminate the PUE attack in a proactive way. Our simulation results proved that our proposed Intense Explore algorithm yields better results than existing techniques.
引用总数
学术搜索中的文章