Open Access   Article Go Back

Spectrum Sensing Cognitive Radio For Opportunistic Access Environments Based Trust Management

T.Nilavazhaki 1 , G.Sathish Kumar2

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 298-301, Apr-2016

Online published on Apr 27, 2016

Copyright © T.Nilavazhaki, G.Sathish Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T.Nilavazhaki, G.Sathish Kumar, “Spectrum Sensing Cognitive Radio For Opportunistic Access Environments Based Trust Management,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.298-301, 2016.

MLA Style Citation: T.Nilavazhaki, G.Sathish Kumar "Spectrum Sensing Cognitive Radio For Opportunistic Access Environments Based Trust Management." International Journal of Computer Sciences and Engineering 4.4 (2016): 298-301.

APA Style Citation: T.Nilavazhaki, G.Sathish Kumar, (2016). Spectrum Sensing Cognitive Radio For Opportunistic Access Environments Based Trust Management. International Journal of Computer Sciences and Engineering, 4(4), 298-301.

BibTex Style Citation:
@article{Kumar_2016,
author = {T.Nilavazhaki, G.Sathish Kumar},
title = {Spectrum Sensing Cognitive Radio For Opportunistic Access Environments Based Trust Management},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {298-301},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=936},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=936
TI - Spectrum Sensing Cognitive Radio For Opportunistic Access Environments Based Trust Management
T2 - International Journal of Computer Sciences and Engineering
AU - T.Nilavazhaki, G.Sathish Kumar
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 298-301
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1505 1376 downloads 1465 downloads
  
  
           

Abstract

Cognitive Radio System has emerged as a arrangement to the growing range scarcity furthermore, inefficiency problems. However, Cognitive Radio Systems face execution furthermore, security bottlenecks due to lack of memory furthermore, boundless computational capabilities. This issue could be solved if we make use of Cloud as a focal element for storing range accessibility data furthermore, handling of the range accessibility data furthermore, correctly map the region of the unauthorized client to that of the accessible range bands. We will be considering only those range groups for correspondence where the primary customers are absent. If the authorized client is detected, we shall vacant that bands, furthermore, move to another unmoving range bands, that matches our requirements. Admittance will be based on FCFS premise furthermore, at the same time the Quality of Administration necessities (in terms of data rate) of the unauthorized customers will satisfied.

Key-Words / Index Term

Cloud Computing, Cognitive Radio Network, Dynamic Range Access, Hierarchical Access Structure, Range Task Policy.

References

[1] Farhan Bashir Shaikh; , “Security threats in cloud computing”, Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, Year: 2011, Pages: 214 – 219.
[2] Mohemed Almorsy; John Grundy; Amani S. Ibrahim, “Collaboration-Based Cloud Computing Security Management Framework”, Cloud Computing (CLOUD), 2011 IEEE International Conference on, Year: 2011,Pages: 364 – 371.
[3] Zehua Zhang; Xuejie Zhang, “Realization of open cloud computing federation based on mobile agent”, Intelligent Computing and Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on, Year: 2009, Volume: 3, Pages: 642 – 646.
[4] Wang En Dong; Wu Nan; Li Xu, “QoS-Oriented Monitoring Model of Cloud Computing Resources Availability”, Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on, Year: 2013, Pages: 1537 – 1540.
[5] Dipayan Dev; Krishna Lal Baishnab, “Notice of Violation of IEEE Publication Principles A Review and Research Towards Mobile Cloud Computing”, Mobile Cloud Computing, Services, and Engineering, MobileCloud), 2014 2nd IEEE International Conference on, Year: 2014, Pages: 252 – 256.
[6] Yong Pan; Ning Hu, “Research on dependability of cloud computing systems Reliability”, Maintainability and Safety (ICRMS), 2014 International Conference on, Year: 2014, Pages: 435 – 439.
[7] Aminatul Solehah Idris; Nurhilyana Anuar; Mudiana Mokhsin Misron; Farah Hanim Mohd Fauzi, “The readiness of Cloud Computing: A case study in Politeknik Sultan Salahuddin Abdul Aziz Shah, Shah Alam”, Computational Science and Technology (ICCST), 2014 International Conference on, Year: 2014, Pages: 1 – 5.
[8] Ubaidullah Alias Kashif; Zulfiqar Ali Memon; Abdul Rasheed Balouch; Jamil Ahmed Chandio, “Distributed trust protocol for IaaS Cloud Computing”, 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST),Year: 2015, Pages: 275 - 279
[9] Qiang Guan; Chi-Chen Chiu; Song Fu, “CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures”, Dependable Computing (PRDC), 2012 IEEE 18th Pacific Rim International Symposium on, Year: 2012, Pages: 11 – 20.
[10] Yanuarizki Amanatullah; Charles Lim; Heru Purnomo Ipung; Arkav Juliandri” Toward cloud computing reference architecture: Cloud service management perspective”,ICT for Smart Society (ICISS), 2013 International Conference on ,Year: 2013, Pages: 1 – 4.
[11] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
[12] Sohraab Soltani; Yalin Sagduyu; Yi Shi; Jason Li; Jared Feldman; John Matyjas, “Distributed cognitive radio network architecture, SDR implementation and emulation testbed”, Military Communications Conference, MILCOM 2015 - 2015 IEEE, Year: 2015, Pages: 438 – 443.
[13] Jerome Sonnenberg; David B. Chester; James Schroeder; Keith Olds, “Quantifying the relative merits of genetic and swarm algorithms for network optimization in cognitive radio networks”, MILCOM 2012 - 2012 IEEE Military Communications Conference, Year: 2012, Pages: 1 – 8.
[14] Sohraab Soltani; Yalin E. Sagduyu; Jason H. Li; Jared Feldman; John Matyjas, “Demonstration of plug-and-play cognitive radio network emulation testbed”, Dynamic Spectrum Access Networks (DYSPAN), 2014 IEEE International Symposium on, Year: 2014, Pages: 376 – 377.
[15] Guolin Sun; Guisong Liu; Yi Wang, “SDN architecture for cognitive radio networks”, Cognitive Cellular Systems (CCS), 2014 1st International Workshop on, Year: 2014, Pages: 1 – 5.
[16] J.Nandhini and V.Hamsadhwani, "Improving interference mitigation and priority based channel allocation in cognitive radio networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-05, Page No (16-20), May -2015
[17] Minho Jo; Longzhe Han; Dohoon Kim; Hoh Peter, “In Selfish attacks and detection in cognitive radio Ad-Hoc networks”, IEEE Network, Year: 2013, Volume: 27, Issue: 3, Pages: 46 - 50,
[18] Saifur Rahman Sabuj; Masanori Hamamura; Shougo Kuwamura, “Detection of intelligent malicious user in cognitive radio network by using friend or foe (FoF) detection technique”, Telecommunication Networks and Applications Conference (ITNAC), 2015 International, Year: 2015,Pages: 155 - 160,
[19] Navdeep Kaur Randhawa and Avtar Singh Buttar, "Sensing of Spectrum Holes in Cognitive Radio Networks: A Survey", International Journal of Computer Sciences and Engineering, Volume-02, Issue-08, Page No (28-34), Aug -2014
[20] Zhihui Shu; Jiazhen Zhou; Yaoqing Yang; Hamid Sharif; Yi Qian, “Network coding-aware channel allocation and routing in cognitive radio networks”, Global Communications Conference (GLOBECOM), 2012 IEEE, Year: 2012, Pages: 5590 – 5595.