Analysis of Attacks in Cognitive Radio Networks

Provided by: International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
Topic: Enterprise Software
Format: PDF
As the wireless communication greatly depends on spectrum utilization, the increase in demand for new wireless services and their application leads to the spectrum scarcity. To efficiently access the unavailable spectrum cognitive radio is used. The demanding technology is introduced new spectrum allocation policies, which will allow unlicensed users (i.e., secondary users) to access the radio spectrum when it is not occupied by licensed users (i.e., primary users) will be exploited by the Cognitive Radio (CR) technology. Security is one of the critical attributes of any communication network.

Find By Topic