Developing malevolent node-based protection system against jamming attack in agent assisted CRN
by Natasha Saini; Nitin Pandey; Ajeet Pal Singh
International Journal of Information and Computer Security (IJICS), Vol. 13, No. 1, 2020

Abstract: Recent advancements in CRN realises many applications such as industrials, future fifth generation network, vehicular network and so on. However, CRN is vulnerable to security attacks which are held on different layers of the network. Many research works are followed up on CRN in the security perspective but none of them is able to secure network from multiple attacks. This paper presents a malevolent node-based protection system (MNPS) to mitigate SSDF attack and jamming attack in agent assisted CRN. Network is prevented from unauthorised SUs with the aid of certificate aware hash chaining (CAHC) algorithm-based authentication process. Malevolent SUs in the network are detected by analysing sensing reports of SUs and SA. SSDF attack detection is carried out using trust conscious attacker detection (TCAD) scheme in which improved k-means (IK-means) algorithm is involved for report analysis. Malevolent SU is act as supporter node in order to mitigate jamming attack in the network. Best channel that attracts attackers towards it is assigned for supporter node by hybrid cuckoo search with firefly algorithm (HCS-FFA). Extensive experimental results show promising results in delay, packet delivery ratio, secrecy rate, signal to interference and noise ratio (SINR), and probability of false-alarm.

Online publication date: Fri, 03-Jul-2020

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com