{"title":"认知无线电网络环境感知安全频谱感知","authors":"A. Chavan, Alok Sahu, Apparna A. Junnarkar","doi":"10.1109/CONIT55038.2022.9848020","DOIUrl":null,"url":null,"abstract":"In like manner, the objective of this exploration study is to foster a proficient trust-based security answer for dynamic range detecting in CR-MANETs. Our proposed answer for working on the exhibition of CR-MANETs within the sight of attacks, for example, SSDF and ISSDF is depicted exhaustively in the accompanying area. The primary component of the interaction includes the improvement of SSDF and ISSDF assaults for use in CR-MANETs. Second, the writing survey and recognizable proof of worries connected with the security of CR-MANETs against different sorts of attacks. In the accompanying area, we propose a one of a kind trust-based worldview that can improve the inadequacies of existing methodologies while likewise safeguarding CR-MANETs from SSDF and ISSDF attacks. Leading a presentation examination to demonstrate the adequacy of the proposed model was the last advance in characterizing the review results. We are endeavoring to assemble a trust-based framework in which the trust of PU and SU will be estimated in light of their development designs and different measurements like energy utilization and creation. Alongside a setting mindful circulated trust procedure, the structure is based on a versatility mindful answer for energy proficient SSDF and ISSDF assault location, as well as a setting mindful disseminated trust technique. With the assistance of PU missing and present settings, the SU hubs analyze the dependability of their associations with each other. They will then, at that point, mention objective facts from each other while considering the versatility and energy upsides of SUs.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Context-aware Secure Spectrum Sensing for Cognitive Radio Networks\",\"authors\":\"A. Chavan, Alok Sahu, Apparna A. Junnarkar\",\"doi\":\"10.1109/CONIT55038.2022.9848020\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In like manner, the objective of this exploration study is to foster a proficient trust-based security answer for dynamic range detecting in CR-MANETs. Our proposed answer for working on the exhibition of CR-MANETs within the sight of attacks, for example, SSDF and ISSDF is depicted exhaustively in the accompanying area. The primary component of the interaction includes the improvement of SSDF and ISSDF assaults for use in CR-MANETs. Second, the writing survey and recognizable proof of worries connected with the security of CR-MANETs against different sorts of attacks. In the accompanying area, we propose a one of a kind trust-based worldview that can improve the inadequacies of existing methodologies while likewise safeguarding CR-MANETs from SSDF and ISSDF attacks. Leading a presentation examination to demonstrate the adequacy of the proposed model was the last advance in characterizing the review results. We are endeavoring to assemble a trust-based framework in which the trust of PU and SU will be estimated in light of their development designs and different measurements like energy utilization and creation. Alongside a setting mindful circulated trust procedure, the structure is based on a versatility mindful answer for energy proficient SSDF and ISSDF assault location, as well as a setting mindful disseminated trust technique. With the assistance of PU missing and present settings, the SU hubs analyze the dependability of their associations with each other. They will then, at that point, mention objective facts from each other while considering the versatility and energy upsides of SUs.\",\"PeriodicalId\":270445,\"journal\":{\"name\":\"2022 2nd International Conference on Intelligent Technologies (CONIT)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Intelligent Technologies (CONIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONIT55038.2022.9848020\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT55038.2022.9848020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Context-aware Secure Spectrum Sensing for Cognitive Radio Networks
In like manner, the objective of this exploration study is to foster a proficient trust-based security answer for dynamic range detecting in CR-MANETs. Our proposed answer for working on the exhibition of CR-MANETs within the sight of attacks, for example, SSDF and ISSDF is depicted exhaustively in the accompanying area. The primary component of the interaction includes the improvement of SSDF and ISSDF assaults for use in CR-MANETs. Second, the writing survey and recognizable proof of worries connected with the security of CR-MANETs against different sorts of attacks. In the accompanying area, we propose a one of a kind trust-based worldview that can improve the inadequacies of existing methodologies while likewise safeguarding CR-MANETs from SSDF and ISSDF attacks. Leading a presentation examination to demonstrate the adequacy of the proposed model was the last advance in characterizing the review results. We are endeavoring to assemble a trust-based framework in which the trust of PU and SU will be estimated in light of their development designs and different measurements like energy utilization and creation. Alongside a setting mindful circulated trust procedure, the structure is based on a versatility mindful answer for energy proficient SSDF and ISSDF assault location, as well as a setting mindful disseminated trust technique. With the assistance of PU missing and present settings, the SU hubs analyze the dependability of their associations with each other. They will then, at that point, mention objective facts from each other while considering the versatility and energy upsides of SUs.