A Trust Framework to Detect Malicious Nodes in Cognitive Radio Networks
نویسندگان
چکیده
منابع مشابه
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملA game theoretic approach to detect and co-exist with malicious nodes in wireless networks
Identification and isolation of malicious nodes in a distributed system is a challenging problem. This problem is further aggravated in a wireless network because the unreliable channel hides the actions of each node from one another. Therefore, a regular node can only construct a belief about a malicious node through monitoring and observation. In this paper, we use game theory to study the in...
متن کاملUsing Learned Data Patterns to Detect Malicious Nodes in Sensor Networks
As sensor network applications often involve remote, distributed monitoring of inaccessible and hostile locations, they are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We consider sensor nodes organized in a hierarchy where the non-leaf nodes se...
متن کاملA cloud service for trust management in cognitive radio networks
Transferring computations for cognitive radio network (CRN) management to a computer cloud opens the possibility to implement new, possibly more accurate and powerful resource management strategies. Algorithms to discover communication channels currently in use by a primary transmitter and identify malicious nodes with high probability could be based on past history; when the trust is computed ...
متن کاملSecurity management based on trust determination in cognitive radio networks
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechani...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2019
ISSN: 2079-9292
DOI: 10.3390/electronics8111299