Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special Section: Intelligent, Smart and Scalable Cyber-Physical Systems
Guest editors: V. Vijayakumar, V. Subramaniyaswamy, Jemal Abawajy and Longzhi Yang
Article type: Research Article
Authors: Srinivasan, Sundara; * | ShivaKumar, K.B.b | Muazzam, Mohammadc
Affiliations: [a] Research Scholar, Department of ECE, Mewar University, Chittorgarh, Rajasthan | [b] Department of Tce, Sri Siddhartha Institute of Technology, Tumakuru | [c] Mewar University, Chittorgarh, Rajasthan
Correspondence: [*] Corresponding author. Sundar Srinivasan, Research Scholar, Department of ECE, Mewar University, Chittorgarh, Rajasthan. E-mail: [email protected].
Abstract: A cognitive radio (CR) can be programmed and configured dynamically to use best wireless channels. Such a radio automatically detects available channels in wireless spectrum, and then accordingly changes its transmission. The CR system consists of primary user or licensed user and secondary user or unlicensed user. The security attacks such as active attack and passive attack are identified between primary user and secondary user and packet loss occurs during packet transmission. The security problem occurring while transmission of signal between primary user and secondary user is rectified by using a hybrid RSA (Riverest, Shaimer and Adleman) and HMAC (Hash Message Authentication Code) algorithms where former is used for key generation and latter is used for tag generation which is sent along with signal. Additionally packet loss incurred in system incurs is reduced with aid of Markov Chain Model during transmission. The comparison results provided showefficiency of the proposed algorithm in cognitive radio system in terms of parameters such as throughput, encryption time, decryption time, Packet Delivery Ratio and energy consumption.
Keywords: Cognitive radio, RSA (Riverest, Shaimer and Adleman), HMAC (Hash Message Authentication Code), Markov Chain Model, active attack, passive attack
DOI: 10.3233/JIFS-169999
Journal: Journal of Intelligent & Fuzzy Systems, vol. 36, no. 5, pp. 4449-4459, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]