Spectrum Sensing Cognitive Radio For Opportunistic Access Environments Based Trust Management
Keywords:
Cloud Computing, Cognitive Radio Network, Dynamic Range Access, Hierarchical Access Structure, Range Task PolicyAbstract
Cognitive Radio System has emerged as a arrangement to the growing range scarcity furthermore, inefficiency problems. However, Cognitive Radio Systems face execution furthermore, security bottlenecks due to lack of memory furthermore, boundless computational capabilities. This issue could be solved if we make use of Cloud as a focal element for storing range accessibility data furthermore, handling of the range accessibility data furthermore, correctly map the region of the unauthorized client to that of the accessible range bands. We will be considering only those range groups for correspondence where the primary customers are absent. If the authorized client is detected, we shall vacant that bands, furthermore, move to another unmoving range bands, that matches our requirements. Admittance will be based on FCFS premise furthermore, at the same time the Quality of Administration necessities (in terms of data rate) of the unauthorized customers will satisfied.
References
Farhan Bashir Shaikh; , “Security threats in cloud computing”, Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, Year: 2011, Pages: 214 – 219.
Mohemed Almorsy; John Grundy; Amani S. Ibrahim, “Collaboration-Based Cloud Computing Security Management Framework”, Cloud Computing (CLOUD), 2011 IEEE International Conference on, Year: 2011,Pages: 364 – 371.
Zehua Zhang; Xuejie Zhang, “Realization of open cloud computing federation based on mobile agent”, Intelligent Computing and Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on, Year: 2009, Volume: 3, Pages: 642 – 646.
Wang En Dong; Wu Nan; Li Xu, “QoS-Oriented Monitoring Model of Cloud Computing Resources Availability”, Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on, Year: 2013, Pages: 1537 – 1540.
Dipayan Dev; Krishna Lal Baishnab, “Notice of Violation of IEEE Publication Principles A Review and Research Towards Mobile Cloud Computing”, Mobile Cloud Computing, Services, and Engineering, MobileCloud), 2014 2nd IEEE International Conference on, Year: 2014, Pages: 252 – 256.
Yong Pan; Ning Hu, “Research on dependability of cloud computing systems Reliability”, Maintainability and Safety (ICRMS), 2014 International Conference on, Year: 2014, Pages: 435 – 439.
Aminatul Solehah Idris; Nurhilyana Anuar; Mudiana Mokhsin Misron; Farah Hanim Mohd Fauzi, “The readiness of Cloud Computing: A case study in Politeknik Sultan Salahuddin Abdul Aziz Shah, Shah Alam”, Computational Science and Technology (ICCST), 2014 International Conference on, Year: 2014, Pages: 1 – 5.
Ubaidullah Alias Kashif; Zulfiqar Ali Memon; Abdul Rasheed Balouch; Jamil Ahmed Chandio, “Distributed trust protocol for IaaS Cloud Computing”, 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST),Year: 2015, Pages: 275 - 279
Qiang Guan; Chi-Chen Chiu; Song Fu, “CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures”, Dependable Computing (PRDC), 2012 IEEE 18th Pacific Rim International Symposium on, Year: 2012, Pages: 11 – 20.
Yanuarizki Amanatullah; Charles Lim; Heru Purnomo Ipung; Arkav Juliandri” Toward cloud computing reference architecture: Cloud service management perspective”,ICT for Smart Society (ICISS), 2013 International Conference on ,Year: 2013, Pages: 1 – 4.
Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
Sohraab Soltani; Yalin Sagduyu; Yi Shi; Jason Li; Jared Feldman; John Matyjas, “Distributed cognitive radio network architecture, SDR implementation and emulation testbed”, Military Communications Conference, MILCOM 2015 - 2015 IEEE, Year: 2015, Pages: 438 – 443.
Jerome Sonnenberg; David B. Chester; James Schroeder; Keith Olds, “Quantifying the relative merits of genetic and swarm algorithms for network optimization in cognitive radio networks”, MILCOM 2012 - 2012 IEEE Military Communications Conference, Year: 2012, Pages: 1 – 8.
Sohraab Soltani; Yalin E. Sagduyu; Jason H. Li; Jared Feldman; John Matyjas, “Demonstration of plug-and-play cognitive radio network emulation testbed”, Dynamic Spectrum Access Networks (DYSPAN), 2014 IEEE International Symposium on, Year: 2014, Pages: 376 – 377.
Guolin Sun; Guisong Liu; Yi Wang, “SDN architecture for cognitive radio networks”, Cognitive Cellular Systems (CCS), 2014 1st International Workshop on, Year: 2014, Pages: 1 – 5.
J.Nandhini and V.Hamsadhwani, "Improving interference mitigation and priority based channel allocation in cognitive radio networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-05, Page No (16-20), May -2015
Minho Jo; Longzhe Han; Dohoon Kim; Hoh Peter, “In Selfish attacks and detection in cognitive radio Ad-Hoc networks”, IEEE Network, Year: 2013, Volume: 27, Issue: 3, Pages: 46 - 50,
Saifur Rahman Sabuj; Masanori Hamamura; Shougo Kuwamura, “Detection of intelligent malicious user in cognitive radio network by using friend or foe (FoF) detection technique”, Telecommunication Networks and Applications Conference (ITNAC), 2015 International, Year: 2015,Pages: 155 - 160,
Navdeep Kaur Randhawa and Avtar Singh Buttar, "Sensing of Spectrum Holes in Cognitive Radio Networks: A Survey", International Journal of Computer Sciences and Engineering, Volume-02, Issue-08, Page No (28-34), Aug -2014
Zhihui Shu; Jiazhen Zhou; Yaoqing Yang; Hamid Sharif; Yi Qian, “Network coding-aware channel allocation and routing in cognitive radio networks”, Global Communications Conference (GLOBECOM), 2012 IEEE, Year: 2012, Pages: 5590 – 5595.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
