Threat detection in Cognitive radio networks using SHA-3 algorithm

Cognitive Radio Network makes intelligent use of the spectrum resources. However, spectrum sensing is vulnerable to numerous harmful assaults. To lower the network's performance, hackers attempt to alter the sensed result. In the fusion centre, blockchain technology is used to make broad judgme...

Full description

Saved in:
Bibliographic Details
Published inTENCON 2022 - 2022 IEEE Region 10 Conference (TENCON) pp. 1 - 6
Main Authors Ezhilarasi, I Evelyn, Clement, J Christopher
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Cognitive Radio Network makes intelligent use of the spectrum resources. However, spectrum sensing is vulnerable to numerous harmful assaults. To lower the network's performance, hackers attempt to alter the sensed result. In the fusion centre, blockchain technology is used to make broad judgments on spectrum sensing in order to detect and thwart hostile activities. The sensed local results are hashed using the SHA 3 technique. This improves spectrum sensing precision and effectively thwarts harmful attacks. In comparison to other established techniques like equal gain combining, the simulation results demonstrate higher detection probability and sensing precision. Thus, employing Blockchain technology, cognitive radio network security can be significantly enhanced.
ISSN:2159-3450
DOI:10.1109/TENCON55691.2022.9977985