{"title":"A Framework for Secure Cooperative Spectrum Sensing based with Blockchain and Deep Learning model in Cognitive Radio","authors":"Neelam Dewangan, Arunima S Kumar, R. N. Patel","doi":"10.1109/ICECONF57129.2023.10083887","DOIUrl":null,"url":null,"abstract":"Today we live in era where not only humans interact but machines interact too. Internet of Things has disrupted the communication with an enormous growth in number of connected devices worldwide. This resulted in big challenges to meet the spectrum requirement of these devices such as seamless connectivity, scalability and accessibility. Cognitive Radio (CR) is designed to meet the requirement since it uses spectrum holes in the licensed bands. Security issues put at risk spectrum sensing, a crucial part of the Cognitive Radio Network (CRN).A malicious user (MU) reduces the accuracy of spectrum sensing, particularly in the situation of cooperative spectrum sensing where MU transmits fabricated data to the fusion centre. The performance of cognitive radios may suffer from the presence of such MU in the system that create erroneous sensing data. As a result, this paper proposes a Blockchain-based method for MU detection in networks. This strategy makes it simple to distinguish between a trustworthy user and a MU using cryptographic keys. The effectiveness of the suggested technique is examined using python tool. The proposed method detects Malicious user with 100 % efficiency in very less sensing time of 0.6ms. The results were also compared with adaptive threshold, FOF and TTA algorithms.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECONF57129.2023.10083887","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Today we live in era where not only humans interact but machines interact too. Internet of Things has disrupted the communication with an enormous growth in number of connected devices worldwide. This resulted in big challenges to meet the spectrum requirement of these devices such as seamless connectivity, scalability and accessibility. Cognitive Radio (CR) is designed to meet the requirement since it uses spectrum holes in the licensed bands. Security issues put at risk spectrum sensing, a crucial part of the Cognitive Radio Network (CRN).A malicious user (MU) reduces the accuracy of spectrum sensing, particularly in the situation of cooperative spectrum sensing where MU transmits fabricated data to the fusion centre. The performance of cognitive radios may suffer from the presence of such MU in the system that create erroneous sensing data. As a result, this paper proposes a Blockchain-based method for MU detection in networks. This strategy makes it simple to distinguish between a trustworthy user and a MU using cryptographic keys. The effectiveness of the suggested technique is examined using python tool. The proposed method detects Malicious user with 100 % efficiency in very less sensing time of 0.6ms. The results were also compared with adaptive threshold, FOF and TTA algorithms.