Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks

  title={Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks},
  author={Azeem Mohammed Abdul and Syed Umar},
  journal={Indonesian Journal of Electrical Engineering and Computer Science},
  • A. Abdul, Syed Umar
  • Published 2017
  • Computer Science
  • Indonesian Journal of Electrical Engineering and Computer Science
In the CRN (cognitive Radio Networks) the main issues to be addressed are spectrum scarcity and inadequate usage of spectrum. The CRN can analyse the unused spectrum, so that CRN users can easily occupy the unused spectrum without blocking the existing Primary Users. In a CRN, routing is a complex issue because of channel diversity. The existing system mainly focuses on the performance analysis of Ad hoc On-Demand Distance Vector (AODV) and the Weight Cumulative Expected transmission time… 
5 Citations
Selective Cooperative Jamming Based Relay Selection and Blowfish Encryption for Enhancing Channel and Data Security in CRAHN Routing
A better and secured routing algorithm is developed in this chapter by modifying and enhancing the SMOR model and selective cooperative jamming (SCJ) based relay selection is utilized in the proposed model.
Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol
A method to detect replay attacks by incorporating time stamp and sequence number in Modbus communications and a frame filtering module which will block unauthorized attacks like False Command Injection and False Access Injection attacks to reach programmable logic controller (PLC).
Empowering E-governance with E-voting
The presented work demonstrates an online e-voting prototype system called SecureV, which achieves specific tasks namely, maintaining the anonymity of the voter, encryption of the vote, integrity check and avoids second time voting.


Comparison of Routing Protocol AODV and WCETT in Cognitive Radio Network
Cognitive radio adhoc network (CRAHN) simulation environment is used with AODV and WCETT routing protocols used to address the problem of efficient route selection between the source and destination and the simulation result shows that performance ofWCETT is better than the A ODV because of its better route selection strategy in CRAHN.
An on-demand routing protocol for multi-hop multi-radio multi-channel cognitive radio networks
This paper proposes a multi-radio multi-channel on-demand solution that is able to effectively manage the transmission activities of cognitive and primary users and highlights the performance of the proposed solution and compares it to multi- radio multichannel on- demand distance vector protocol.
An On-demand Routing Technique for Cognitive Radio Ad Hoc Network
ROPCORN: Routing protocol for cognitive radio ad hoc networks
  • A. Talay, D. Altilar
  • Computer Science
    2009 International Conference on Ultra Modern Telecommunications & Workshops
  • 2009
A novel routing algorithm for future multi-hop cognitive radio networks is proposed and it has been shown that the proposed approach provides better adaptability to the environment and maximizes throughput in a number of realistic scenarios and outperforms recently proposed routing protocols for Cognitive radio networks.
A Novel Review on Routing Protocols in MANETs
Mobile means moving and ad hoc means temporary without any fixed infrastructure so mobile ad hoc networks are a kind of temporary networks in which nodes are moving without any fixed infrastructure
Evaluation of Protocol Applied to Network Routing WCETT Cognitive Radio
This article presents the results of researchrelated to the assessment protocol weightedcumulative expected transmission time (WCETT)applied to cognitive radio networks.The development work was based
Cognitive radio: brain-empowered wireless communications
  • S. Haykin
  • Computer Science
    IEEE Journal on Selected Areas in Communications
  • 2005
Following the discussion of interference temperature as a new metric for the quantification and management of interference, the paper addresses three fundamental cognitive tasks: radio-scene analysis, channel-state estimation and predictive modeling, and the emergent behavior of cognitive radio.
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.
MD5 considered harmful today, creating a rogue CA certificate
Reference EPFL-CONF-164547 URL: Record created on 2011-03-29, modified on 2017-05-12
Comparative Analysis of AOMDV, AODV, DSR and DSDV Routing Protocols for Cognitive Radio
  • Communication & Instrumentation Engineering Research and Development (IJECIERD)
  • 2013