Analysis of Attacks in Cognitive Radio Networks

As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services and their application leads to the spectrum scarcity. To efficiently access the unavailable spectrum cognitive radio is used. The demanding technology is introduced new spectrum allocation policies, which will allow unlicensed users (i.e., secondary users) to access the radio spectrum when it is not occupied by licensed users (i.e., primary users) will be exploited by the Cognitive Radio (CR) technology. Security is one of the critical attributes of any communication network.

Provided by: International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Topic: Enterprise Software Date Added: Aug 2015 Format: PDF

Find By Topic