Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

General Research Article

Trust Optimization for Byzantine Attacks in Cognitive Networks

Author(s): Natasha Saini*, Nitin Pandey and Ajeet Pal Singh

Volume 11, Issue 1, 2021

Published on: 31 December, 2018

Page: [89 - 95] Pages: 7

DOI: 10.2174/2210327909666181231112317

Price: $65

Abstract

Background & Objective: Cognitive Radio Network (CRN) is an emerging technology that provides ability of adapting operating parameters to wireless devices in order to overcome spectrum scarcity problems. However, involvement of numerous pervasive smart wireless devices introduces many security threats in CRN. The research work specifically highlights the different kinds of attacks that occur in cognitive networks.

Methods: The algorithm is designed which focuses on vulnerabilities that occur in any single or an individual node. The proposed algorithm will take many factors into consideration like integer programming, trust and Byzantine failure model. Though there are various security parameters especially the five major attributes like integrity, confidentiality, availability, authorization, access control and nonrepudiation, which should be considered for developing any alogotithm.

Conclusion: Nevertheless, certain security parameters are kept into consideration, which are embedded into algorithm to make it of its unique kind.

Keywords: Cognitive network, cognitive radio network, network security, algorithm, byzantine failure, security threat.

« Previous
Graphical Abstract


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy