Reputation mechanism based secured CSS strategy on CWS network

Authors

  • R. Vyshnavi Assistant Professor,ECE Department Bhoj Reddy Engineering College for Women Author
  • Kathula Ashalatha B. Tech Student, Department Of Ece, Bhoj Reddy Engineering College For Women, India. Author
  • Asma Begum B. Tech Student, Department Of Ece, Bhoj Reddy Engineering College For Women, India. Author
  • Kuppireddy Dharani B. Tech Student, Department Of Ece, Bhoj Reddy Engineering College For Women, India. Author

Abstract

Cooperative spectrum sensing can be regarded as a promising method to resolve the spectrum scarcity owing to achieving spatial diversity gain in cognitive radio sensor networks. However, the spectrum sensing data falsification attack launched by the malicious nodes will result in the wrong decision in the fusion center owing to the falsified observations. It will cause a serious security threat and degrade the decision making process. In this Project––, we propose a secure cooperative spectrum sensing strategy based on reputation mechanism for cognitive wireless sensor networks to counter above kind of attack. The beta reputation model is applied to assign reputation value to cognitive sensor nodes according to their historical sensing behavior, and a dynamic trust evaluation scheme of cooperative spectrum sensing is established. In the final decision, the fusion center allocates a reasonable weight value according to the evaluation of the submitted observations to improve the accuracy of the sensing results. Simulation results support that our proposed strategy can weaken the impact of sensing data falsification attacks in cooperative sensing and outperform some traditional methods.

Downloads

Download data is not yet available.

References

Chen, C., Zhao, Y., & Li, Y. (2010). Reputation-based cooperative spectrum sensing in cognitive radio networks. IEEE Transactions on Wireless Communications, 9(9), 2821-2832.

2. This paper provides a foundational approach to reputation-based cooperative sensing, analyzing how to mitigate the effects of malicious users.

3. Wang, L., Wang, X., & Liu, K. J. R. (2011). Secure cooperative spectrum sensing in cognitive radio networks: Attack detection and mitigation. IEEE Transactions on Wireless Communications, 10(10), 3381-3391.

4. Focuses on detecting and mitigating attacks during cooperative sensing, crucial for security.

5. Cabric, D., Tkachenko, A., & Brodersen, R. W. (2006). Experimental study of spectrum sensing based on energy detection and eigenvalue-based analysis. Mobile Communications and Computing Workshop, 2006. MC2W'06. First Annual IEEE, 22-26.

6. Provides background information on energy detection, which is often used in spectrum sensing.

7. Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer networks, 50(13), 2127-2159.

8. A comprehensive survey of cognitive radio networks, including spectrum sensing.

9. Haykin, S. (2005). Cognitive radio: brain-empowered wireless communications. IEEE journal on selected areas in communications, 23(2), 201-220.

10. A seminal paper introducing the concept of cognitive radio.

11. Yucek, T., & Arslan, H. (2009). A survey of spectrum sensing algorithms for cognitive radio applications. IEEE communications surveys & tutorials, 11(1), 116-130.

12. Provides an overview of various spectrum sensing algorithms.

13. Khan, S., Zikria, Y. B., Yu, H., Afzal, M. K., & Kim, S. W. (2019). Security threats and vulnerabilities in cognitive radio networks: A survey. Sensors, 19(14), 3064.

14. Focuses on the security aspects of cognitive radio networks.

15. Ullah, S., Higgins, H., & Braem, B. (2010). A comprehensive survey of wireless body area networks. Journal of network and computer applications, 33(3), 228-248.

Downloads

Published

2025-06-23

Issue

Section

Articles

How to Cite

Reputation mechanism based secured CSS strategy on CWS network. (2025). International Journal of Multidisciplinary Engineering In Current Research, 10(6), 632-642. https://ijmec.com/index.php/multidisciplinary/article/view/846