Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks[omnet++code]

Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks

Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks With the rapid increase of wireless applications, wireless has become a scarce resource recently. The free frequency is overcrowded and cannot satisfy the need of the increasing wireless users.Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks[omnet++code] A survey of Federal Communications Commission (FCC) shows that most of the frequencies assigned for exclusive us age are vacant most of the time To make full use of the assigned frequencies and make more chances for users to communicate with each other, a new Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networkstechnology called cognitive radio appeared.

The cognitive radio network can sense information and access the spectrum holes without interfering the primary users who have the right of priority access and it is a radio that can change parameters based on interaction with the wireless environment and learn from history to reach the optimal and secure communications Cognitive radio network generally includes three key technologies: sensing, decision and allocation The main function of the CRN is to access and make full use of spectrum holes.

 

Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Network

For Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networksthe irregular appearance of primary users, the information of spectrum holes changes with time. How to sense the information of spectrum holes and meet the needs of cognitive users to the maximum extent is a key problem in CRN. Sensing is the premise of CRN. Researchers are focus on sensing algorithm and have proposed many sensing algorithms recently Ramzi Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio NetworksSaifan etc. proposed an efficient searching and monitoring scheme in with which cognitive users will find an available channel with very high probability. There are many factors that can affect sensing result, such as network structure. V. Girish considered the network Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networkstopology inAnother key technology is decision, which defines the way to make final sensing result from the sensing data. Its reliability lies in the data fusion algorithm and the accuracy of the sensing data. With the accuracy sensing result, CRN could assign the free bands to cognitive users to maximize utilization. It is more challenging because of the character of dy Cha

nnel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networksnamic access in CRN Spectrum holes vary with the behavior of primary users in dynamic environment. In fact it is diffi cult to predict the regulations of primary users accurately. Therefore, when the primary user comes back, cognitive users should evacuate from the current communication channel and then hand off to other idle channel. CRN tries to satisfy cognitive users, it could seek for idle channels quickly to reduce the interruption time. It is important to decide which frequency can hand off to. In this case, the base station will select an optimal Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networkschannel with the similar feature to the one the cognitive user hands off from to continue communication. Therefore, the handoff technologyis a key problem in CRN that can select available channels for the cognitive users interrupted and satisfy the QoS of cognitive users. In this paper, we analyze a new attack during handoff to CRN. The attack is based on sensing, control channel eavesdropping, primary user emulation attack and handoff mechanism. Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio NetworksIn Section II, CRN principles and security problems are given. The attack model and proposed scheme CSIH scheme are described in Section III, then we give the analysis in Section V and Section VI is the conclusion.