International Journal of Sensors, Wireless Communications and Control

Author(s): Natasha Saini*, Nitin Pandey and Ajeet Pal Singh

DOI: 10.2174/2210327909666181231112317

Trust Optimization for Byzantine Attacks in Cognitive Networks

Page: [89 - 95] Pages: 7

  • * (Excluding Mailing and Handling)

Abstract

Background & Objective: Cognitive Radio Network (CRN) is an emerging technology that provides ability of adapting operating parameters to wireless devices in order to overcome spectrum scarcity problems. However, involvement of numerous pervasive smart wireless devices introduces many security threats in CRN. The research work specifically highlights the different kinds of attacks that occur in cognitive networks.

Methods: The algorithm is designed which focuses on vulnerabilities that occur in any single or an individual node. The proposed algorithm will take many factors into consideration like integer programming, trust and Byzantine failure model. Though there are various security parameters especially the five major attributes like integrity, confidentiality, availability, authorization, access control and nonrepudiation, which should be considered for developing any alogotithm.

Conclusion: Nevertheless, certain security parameters are kept into consideration, which are embedded into algorithm to make it of its unique kind.

Keywords: Cognitive network, cognitive radio network, network security, algorithm, byzantine failure, security threat.

Graphical Abstract