ISSN ONLINE(2278-8875) PRINT (2320-3765)
PRIMARY USER AUTHENTICATION IN COGNITIVE RADIO NETWORKS: A SURVEY
For effective usage of radio frequency spectrum, cognitive radio networks have been proposed, allowing the secondary users to occupy the spectrum whenever the primary user is not using it. To avoid interference with the primary user secondary user should constantly check the usage of the spectrum. But achieving a faithful monitoring is not so easy. Hence Primary user Emulation (PUE) attack comes into existence. To counter this attack primary user’s signal can be authenticated in the physical layer itself. In this paper, we provide various approaches (dealt in different papers) for authenticating primary users’ signals that conforms FCC’s requirement
T.Lakshmibai, B.Chandrasekaran, C.Parthasarathy
To read the full article Download Full Article | Visit Full Article