Matches in SemOpenAlex for { <https://semopenalex.org/work/W2313696670> ?p ?o ?g. }
Showing items 1 to 63 of
63
with 100 items per page.
- W2313696670 abstract "Opportunistic sharing of spectrum through the concept of Cognitive Radio network (CRN) has been considered the next stage in the effort of the government to alleviate the spectrum shortage problem. The idea is to salvage spectra that are rendered fallowed by the licensed (primary) users during their on and off period. Recent literature reiterated that this next generation wireless network is capable of providing ubiquitous connectivity of high-bandwidth communications to both urban and rural communities. It has diverse application domains ranging from distance education to other government-delivered essential services like remote health care delivery and emergency rescue response. The security requirements of CRN must be specified because of the sensitive nature and variety of application domains of the network. Violation of any of the requirements, either maliciously or inadvertently, by users like jammers constitute security threats that will significantly affect the trust and acceptance of the public and further use of the technology. The task of mitigating malicious attacks, especially jamming in this type of network, is very challenging. This is because potential attackers could be operating as Cognitive Radios themselves, and as a result they are capable of preying on the adaptable and reconfigurable features of CRN with the intent of causing serious denial of service to the users of the network. In addition, it will be shown that these jammers are capable of introducing value faults in pathological cases.In this research, we first classified CRNs using a hybrid fault-model taxonomy that considers different fault types including omissive and transmissive value faults. Through simulation, we investigated the performance of CRNs operating in the presence of jamming attacks that are capable of introducing value faults. We observed through performance evaluation like Packet Delivery Ratio (PDR) that these jammers are very effective in their operations and they could bring down the entire CRNs, leading to close to zero packet being delivered by the networks to the destination, even when the rate of jamming is just about 30%. We also discovered that none of the existing solutions are able to mitigate these malicious attacks. As a result, a hybrid forward error correction (FEC) code is proposed that incorporates data integrity checking into an efficient forward error correction mechanism. The new hybrid FEC code is defined as the concatenation of the Raptor code and the Secure Hash Algorithm-2 (SHA-2). We use the Raptor code part of the code to recover data loss, since Raptor code is an FEC code that allows encoded communicated data to be recovered at the destination without the need for a re-transmission, with high probability even when some of the data is lost due to jamming. The SHA-2 part of the code is used to verify the integrity of data received at the destination since CR jammers are capable of manipulating transmitted data. This is possible because SHA-2 can transform any set of data elements into a unique fixed length hash value, which can be verified at both the sender and the receiver for any data manipulation by CR jammers. When data communicated is detected to be lost or manipulated, the approach explores a recovery block based on the application scenario. The algorithm for our proposed solution is presented and its validity and threshold functions are established. We simulate our proposed solution in NS-2 and evaluate its performance by comparing it with ordinary FEC code implementation. The result of the analysis using suitable performance metrics shows that the proposed solution is very efficient and robust against the different rates of jamming perpetrated by CR jammers in a fault-model classified CRN. In addition, the encoding and decoding algorithm of the proposed hybrid FEC code was found to be very efficient because of the observed high recovery rate of the algorithm capable of providing consistent low packet loss ratio (PLR), even at the jammers worse case scenario of 100% jamming rate." @default.
- W2313696670 created "2016-06-24" @default.
- W2313696670 creator A5014056115 @default.
- W2313696670 creator A5044912704 @default.
- W2313696670 date "2013-01-01" @default.
- W2313696670 modified "2023-09-27" @default.
- W2313696670 title "A hybrid fec code for mitigating jamming attacks in fault-model-classified cognitive radio networks" @default.
- W2313696670 hasPublicationYear "2013" @default.
- W2313696670 type Work @default.
- W2313696670 sameAs 2313696670 @default.
- W2313696670 citedByCount "0" @default.
- W2313696670 crossrefType "journal-article" @default.
- W2313696670 hasAuthorship W2313696670A5014056115 @default.
- W2313696670 hasAuthorship W2313696670A5044912704 @default.
- W2313696670 hasConcept C108037233 @default.
- W2313696670 hasConcept C110875604 @default.
- W2313696670 hasConcept C136764020 @default.
- W2313696670 hasConcept C149946192 @default.
- W2313696670 hasConcept C2781133158 @default.
- W2313696670 hasConcept C31258907 @default.
- W2313696670 hasConcept C38652104 @default.
- W2313696670 hasConcept C38822068 @default.
- W2313696670 hasConcept C41008148 @default.
- W2313696670 hasConcept C555944384 @default.
- W2313696670 hasConcept C76155785 @default.
- W2313696670 hasConceptScore W2313696670C108037233 @default.
- W2313696670 hasConceptScore W2313696670C110875604 @default.
- W2313696670 hasConceptScore W2313696670C136764020 @default.
- W2313696670 hasConceptScore W2313696670C149946192 @default.
- W2313696670 hasConceptScore W2313696670C2781133158 @default.
- W2313696670 hasConceptScore W2313696670C31258907 @default.
- W2313696670 hasConceptScore W2313696670C38652104 @default.
- W2313696670 hasConceptScore W2313696670C38822068 @default.
- W2313696670 hasConceptScore W2313696670C41008148 @default.
- W2313696670 hasConceptScore W2313696670C555944384 @default.
- W2313696670 hasConceptScore W2313696670C76155785 @default.
- W2313696670 hasLocation W23136966701 @default.
- W2313696670 hasOpenAccess W2313696670 @default.
- W2313696670 hasPrimaryLocation W23136966701 @default.
- W2313696670 hasRelatedWork W1484106389 @default.
- W2313696670 hasRelatedWork W2030714532 @default.
- W2313696670 hasRelatedWork W2052253475 @default.
- W2313696670 hasRelatedWork W2086174184 @default.
- W2313696670 hasRelatedWork W2124280970 @default.
- W2313696670 hasRelatedWork W2144848153 @default.
- W2313696670 hasRelatedWork W2162999752 @default.
- W2313696670 hasRelatedWork W2182266848 @default.
- W2313696670 hasRelatedWork W2237487238 @default.
- W2313696670 hasRelatedWork W2267789892 @default.
- W2313696670 hasRelatedWork W2341001482 @default.
- W2313696670 hasRelatedWork W2514890051 @default.
- W2313696670 hasRelatedWork W2917938283 @default.
- W2313696670 hasRelatedWork W3195204234 @default.
- W2313696670 hasRelatedWork W2183037507 @default.
- W2313696670 hasRelatedWork W2187371509 @default.
- W2313696670 hasRelatedWork W2188707421 @default.
- W2313696670 hasRelatedWork W2549290440 @default.
- W2313696670 hasRelatedWork W2604527942 @default.
- W2313696670 hasRelatedWork W2741114861 @default.
- W2313696670 isParatext "false" @default.
- W2313696670 isRetracted "false" @default.
- W2313696670 magId "2313696670" @default.
- W2313696670 workType "article" @default.