a novel secure energy efficient spectrum ...a novel secure energy efficient spectrum sensing...

14
A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES N. Priya 1 , Dr.B. Rosiline Jeetha 2 ABSTRACT: The area of security in Cognitive Radio has yet to receive much attention to improve the accuracy level even though there is no correct accuracy to formulate the problem .The Paper proposed Secure Energy Awareness Spectrum Sensing Transaction (SEASST) method are based on semi machine learning technique. This method is used to improve the energy level considering the parameters like Spectrum Sensing, Channel Allocation and Data Transaction through increase of the energy efficiency. The result is proved by Network Simulator version2.35. Key words: Sensing, Security, Energy Awareness, Semi Machine Learning. INTRODUCTION In the area of communication industry, wireless communication is the fastest growing one and it has attracted the attention of media and the imagination of the public. Cellular system has experienced a fast growth over the last decade and currently. There are around two million users worldwide cellular phone have become an integral part and tool of everyday life in most developing countries and it is substituting the old wireless systems in many developing countries. But the main problem with wireless communication is spectrum scarcity. So FCC introduced CR overcome this. The main drawback of SDR is that, it has no intelligence and cannot take decision of its own. It consumes high power, has higher initial cost and also requires higher processing power. A cognitive radio is an intelligent radio that can be programmed and configured dynamically through cognitive capability and Re- configurability. In cognitive capability, the CR learns and observes the surrounding and comes with a decision and based on this decision the CR to reconfigures the hardware and software. To reconfigure the SDR technology is used which all the function were performed software instead of using hardware when this SDR joins with CR, the spectrum utilization and communication efficiency are improved. The strength of CR is six stage cognitive cycle includes observation, orientation, plan, Decision making, Action and Learning. Four functions that mainly used in CR are Spectrum sensing, Spectrum management, spectrum sharing and spectrum Mobility. In this spectrum sensing the main problem is to improve in International Journal of Pure and Applied Mathematics Volume 119 No. 18 2018, 1625-1637 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ Special Issue http://www.acadpubl.eu/hub/ 1625

Upload: others

Post on 30-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION

MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE

LEARNING TECHNIQUES

N. Priya1, Dr.B. Rosiline Jeetha

2

ABSTRACT:

The area of security in Cognitive Radio has yet to receive much attention to improve

the accuracy level even though there is no correct accuracy to formulate the problem .The

Paper proposed Secure Energy Awareness Spectrum Sensing Transaction (SEASST) method

are based on semi machine learning technique. This method is used to improve the energy

level considering the parameters like Spectrum Sensing, Channel Allocation and Data

Transaction through increase of the energy efficiency. The result is proved by Network

Simulator version2.35.

Key words: Sensing, Security, Energy Awareness, Semi Machine Learning.

INTRODUCTION

In the area of communication industry, wireless communication is the fastest growing

one and it has attracted the attention of media and the imagination of the public. Cellular

system has experienced a fast growth over the last decade and currently. There are around

two million users worldwide cellular phone have become an integral part and tool of

everyday life in most developing countries and it is substituting the old wireless systems in

many developing countries. But the main problem with wireless communication is spectrum

scarcity. So FCC introduced CR overcome this. The main drawback of SDR is that, it has no

intelligence and cannot take decision of its own. It consumes high power, has higher initial

cost and also requires higher processing power. A cognitive radio is an intelligent radio that

can be programmed and configured dynamically through cognitive capability and Re-

configurability. In cognitive capability, the CR learns and observes the surrounding and

comes with a decision and based on this decision the CR to reconfigures the hardware and

software. To reconfigure the SDR technology is used which all the function were performed

software instead of using hardware when this SDR joins with CR, the spectrum utilization

and communication efficiency are improved. The strength of CR is six stage cognitive cycle

includes observation, orientation, plan, Decision making, Action and Learning. Four

functions that mainly used in CR are Spectrum sensing, Spectrum management, spectrum

sharing and spectrum Mobility. In this spectrum sensing the main problem is to improve in

International Journal of Pure and Applied MathematicsVolume 119 No. 18 2018, 1625-1637ISSN: 1314-3395 (on-line version)url: http://www.acadpubl.eu/hub/Special Issue http://www.acadpubl.eu/hub/

1625

Page 2: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

security level, channel allocation and transaction management. There are Selfish and

Malicious Attackers, Power-fixed and Power Adaptive Attackers and Static & Mobile

Attackers are founded in cognitive radio. In each layer there are different attacks if that

attack have been cleared in one layer it will attack the other layer for that cross layer. In that

mainly focused on PUE attack and Spectrum Sensing Data Falsification are the major

attacks that cause high lacking in spectrum sensing. If this two attack has been overcome

and the channel is selected and transaction is done it will improve the spectrum sensing

accuracy level and trough put level .In previous research channel selection was done by

various mechanism by machine learning supervised and unsupervised but in this paper semi

supervised machine learning is used so it will show a better result. For the better results

certain process have been under gone here, In this paper, channel allocation problem to

improve the Spectrum Sensing takes place to overcome that secure based cross layer

approach method (SCAM) is used to detect miss probability after this channel selection is

done in supervised manner. In upcoming process it should done through semi-supervised in

secure feature extraction based kernel canonical correlation analysis (SFEKCCA) technique

and channel should allocated and test the stage to get the new optimized channel and transfer

the data in between the channels while transfer the energy should be calculated by correct

detection and miss detection and get the total energy consumption by Energy Efficient

Secure Transaction Scheme (SEESST) base on this average is calculated.

Related work:-

Spectrum Sensing Data Falsification attack (SSDF) is present in cooperative spectrum

sensing. In this attack is found when multiple users used it. Various researches have been

analyzed and overcome to SSDF attack.[1] The author has analyzed pervious research

method in weighted sequential probability ratio test (WSPRT) and enhanced to recover the

technique by using Reputation value (RV).The proposed technique Robust weighted

sequential probability ratio test (RWSPRT), it deal with various attack and find the correct

probability. This technique is proved in simulation results. Primary User Emulation Attack

(PUEA) occurs due to the Secondary User to access unoccupied spectrum band at the

primary User signal cause the attack. To overcome this problem the authors[2] investigated

various methods future the author describe a new method channel impulse response

(CIR).The proposed detection method is used to detect whether the received signal of the PU

or PUEA. To find out the Process are based on between Secondary Users and Signal source.

The performance of proposed method was analyzed and proved by simulation result.

International Journal of Pure and Applied Mathematics Special Issue

1626

Page 3: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

METHODOLOGY

First consider channel allocation problem to improve the Spectrum Sensing takes

place in that energy level, signal noise ratio, locality size will be compared and to get the

result by using SCAM method. To find the miss detection false alarm probability and

detection should be find once and it will be the total correct probability and that checked in

global to know whether it idle or busy and that result consider as total miss detection

probability. After that work channel selection is supervised but it does in limited area with

security to overcome that semi-supervised technique takes place and node will be analyzed

and ready for the channel selection process and sense signal by using hierarchical cluster

based- FEKCCA technique and test the stage and send the result to FC to check the feature

extraction along with the security level to find the new space and allocate the new optimized

channel. The previous work outcome, once the channel is optimized, it is ready for

transaction. During the transaction period data security is most need and it is not much

efficient to overcome. Therefore, to design the Secure Energy Awareness Spectrum Sensing

Transaction scheme (SEESST) well addressed for both problem-in this method using

transaction progression is being transferred from the source side channel is using the

cryptography signature and to the destination side channel is using bond signatures, both are

verified, and also simultaneously aware of the energy level, they are used correction

detection, miss detection by this total energy consumption.

Problem Formulation:

Spectrum sensing:

Secondary User to access unused spectrum band when they causes the Secondary

User Date Falsification Attack and Primary User Emulation Attack these two attack are

mostly dangers for accurate Spectrum sensing. It can be overcome by SCAM method. SCAM

method procedure can be classified into SDFA and PUEA. SDFA to identify by used energy

level and signal noise ratio and the second to identify the PUEA by used locality value

through fingerprint and energy level through threshold value. The process of detection can be

represented as a binary hypothesis testing problem.

H0: rs(t) = an(t)

H1: rs(t) = cg* ts(t) + an(t) -> (1)

International Journal of Pure and Applied Mathematics Special Issue

1627

Page 4: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

The first step is to take the sample hypothesis test and add Gaussian noise. The

following is an example in the case of primary user of the channel is shown as H0, thus the

primary user is absent. If it is given as H1 then the primary user is present .In the case of

secondary user, the received signal is denoted as rs(t) and time as t. ts(t) is the transmit

signal.cg is the channel and an(t) is the Gaussian noise. Ed = |rs t |^22𝐿𝑡=1 .In Ed L is

maximum enough signal noise ratio should find by Gaussian random variable.H0: GRV ~ N

(µ0, σ20)

H1: GRV ~ N (µ1, σ21) -> (2)

Where, µ0=2L, σ2

0 =4L, µ1= 2L (ⱷ+1), σ21 =4L (2ⱷ+1), ⱷis the received SNR of the SU. If

SNR is finalized it should compare with local threshold. ED φ. If it is maximum

spectrum sensing performance should be analyses by using Probability of false alarm

probability of detection are used. The probability of false alarm pfa= P=P(x=1|H0) = Z (ⱷ-

µ0/σ0), the probability of detection pcd=P(x=1|H1) = Z (ⱷ-µ1/σ1), Where Z(X) is the

Gaussian Z-function. The probability of miss-detection 𝑃𝑚d=1−𝑃𝑑= (𝑌<ⱷ|𝐻1).Based on the

upcoming results Total correct probability is calculated.

𝑃=p (𝐻1) + (1−pfa)p(𝐻0) ->(3)

Based on the miss-detection, the malicious node can be found out subsequently the

performance of malicious sensor is formulate, PMF = Pfa * (1- Prob) + (1 -PMF)* Prob,

PMD= Pod * (1- Prob) + (1 -PMD)* Prob.

The SU transfer the data to local decision and Global decision will evaluate the node

whether it’s idle or busy once it idle, channel will try to access the node. If the node is

success it will go further or it create a collision and it will get reevaluated SU and send the

alarm by REF = P(R=1|H0),=P(R=1|H0, F=0)*P(F=0|H0)+P(R=1|F=1,H0)*P(F=1|H0)

= 0+P^QF -> (4)

If Global decision whether the result is busy it will wait for the compulsion of the current

frame work. Then next GD, It will get the final total Miss Probability can be obtained by

using below equation QMP= p(R=0|H1), =P(R=0|H1, F=0)*P(F=0|H1)+P(R=0|F=1,H1)*

P(F=1|H1)

= 0+PXm*(1-QG) -> (5)

International Journal of Pure and Applied Mathematics Special Issue

1628

Page 5: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

Secure Cross layer approach method to detect miss detect probability (SCAM)

1. Secure Cross layer approach method

2. rs(t)=0

3. rs(t) is broadcasted

4. if(H=0 || H=1)

5. then

6. energy detector is calculated

7. if(L>10)

8. then

9. if(H=0 || L>10)

10. then

11. signal noise ratio of H0 is calculated

12. if(H=1 || L>10)

13. then

14. signal noise ratio of H1 is calculated

15. T=0.5

16. if(H>T)

17. then

18. Pfa and Pcd is detected

19. Pmd is calculated

20. Tcp is calculated

21. Tcp and Behaviour of the malicious nodes are detected then sent to the Ld

22. End if

23. End if

24. End if

25. End if

26. Gd(F) evaluates the local decision data

27. if(F=0)

28. then

29. rs(t)->PU channel

30. if(rs(t)=0)

31. then

32. channel gain

33. End if

34. else

35. Reevaluation process takes place

36. Decision is declared

37. End if

38. If(F=1)

39. then

40. Secondary user waits

41. End if

42. Finally Find the total miss probability is obtained

43. End if

International Journal of Pure and Applied Mathematics Special Issue

1629

Page 6: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

Channel Allocation

Based on the above result, supervised is used to channel selection but its selected in

limited area with security to overcome that in following work semi-supervised technique is

takes place with same security level and node will be analyzed and ready for the channel

selection process and sense signal and move to Local-to- FC. FC takes place and applies

FEKCCA technique for the feature that provides maximum correction among the SU.FC

analyze and initial test the stage and checked in autonomous testing or cooperative testing

and get the result in both way and send again to FC and test the energy and cyclic feature and

find the space. Kernel-based Learning is data transformed into a elevated dimensioned

feature space find by using,

Ψ ∶ 𝑦𝑖𝑛 → Ψ(𝑦𝑖𝑛 ) -> (6)

Explicit calculating the new space may be hard to find dimensionality and it’s possible to

calculate inner product and security level by using mercer’s condition formulated by

Ker(yij,yix)=𝜓((yij),𝜓 (yix)).The space induced by a kernel that considers the polynomial

kernel by two dimensional feature vectors that composed of energy level. This kernel can be

expanded in individual by using (𝑦𝑖𝑇𝑦𝑗 )2 = (𝑓𝑖1𝑓𝑗1 + 𝑓𝑗2𝑓𝑗2)2

.Feature mapping takes the

form, which correspond to three dimensional feature spaces, this polynomial kernel used in

more general formulate as 𝐾𝑒𝑟 𝑦𝑖𝑗 , 𝑦𝑖𝑘 = (𝑦𝑖𝑗𝑇𝑦𝑖𝑘 + 𝑐) q. It considers the stand Gaussian

kernel is given by𝐾𝑒𝑟 𝑦𝑖𝑗 ,𝑦𝑖𝑘 =exp (− 𝑦𝑖𝑗−𝑦𝑖𝑘 2/2𝑤𝑖2) .It contains infinitely-dimensional.

𝐾 𝑥𝑖𝑗 , 𝑥𝑖𝑘 = exp( 𝑥𝑖𝑗 − 𝑥𝑖𝑘 2/2𝑤𝑖

2) -> (7)

Feature space by sub index. The gram matrix Ki for the data set is used to find pair-wise

kernel of the data as its element.

𝐺𝑖 𝑗,𝑘 = 𝐾𝑒𝑟 𝑦𝑖𝑗 , 𝑦𝑖𝑘 = Φ(𝑦𝑖𝑗 )TΦ 𝑦𝑖𝑘 ->(8)

Kernel canonical correlation Analysis for CSS that consider a scenario in which M SU

present and get the order of correlation between multiple data sets and each pair is used in

canonical correlation between the data set 𝛽i can be subsequently obtained as

𝛽𝑖 . = 1

𝑁−1 𝛽𝑖𝑗 .

𝑁𝑗=1 ->(9)

Trivial solution is used to avoid the canonical variants 1

𝑁 𝓍𝑖

𝑁𝑖=1

2=1

𝑁 𝛼𝑖

𝑇𝐺𝑖𝐺𝑖𝛼𝑖𝑁𝑖=1 = 1.In

next step over-fitting problem can be avoided and eliminate the norm of projectors

International Journal of Pure and Applied Mathematics Special Issue

1630

Page 7: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

by1

𝑁 𝛼𝑖

𝑇𝐺𝑖𝐺𝑖𝛼𝑖𝑁𝑖=1 + 𝑐𝛼𝑖

𝑇𝐺𝑖𝛼𝑖 = 1. The canonical weight Xi is used to overcome the

problem with Lagrange Multipliers by generalize Eigen value ,1

𝑁𝐿𝛼 = 𝛾𝐸𝛼.The selection

that contains canonical weight to find GEV problem and Cooperative list the FC and get the

result. The CCA requires the data and KCCA applies the CCA feature to find the new

space, 𝜓(𝑦𝑖𝑛𝑁𝑖=1 ) = 0, 𝑖 = 1,… ,𝑁, To find the Gram matrix

𝐺𝑖~ = 𝑁0𝐺𝑖𝑁0𝑇 ->(10)

After KCCA it obtains the non-liner local detection. Kernel function calculated the center

data by canonical vector and statistical tested. If it enter the FC by expansion of data through

sensing device in order to compute and if global test is statistic is simply obtained𝑇𝑖 𝑦𝑖 =

𝛼𝑖𝑗𝑘𝑒𝑟 (𝑦𝑖 ,𝑦𝑖𝑗 )𝑁𝑖=1 ,𝑇𝑖 𝑦𝑖 = 𝑇𝑖(𝑥𝑖)

𝑁𝑖=1 , Finally result is an improved detection performance

is satisfied.

Hierarchical cluster based SFEKCCA method for CSS Channel allocation

Step 1:- Assuming the sample takes as secondary user from that select the channel of

primary user

Step 2:- The information is send to the fusion center.

Step 3:- Based on the feature of FC, SFEKCCA technique is implemented.

Step 4:- Through elevated-dimensional a new space is to be found and calculate inner

products which are being used by polynomial kernel.

Step 5:- In Feature extraction the measurement is report (autonomously and cooperatively)

to fusion center while each time channel is selected.

Step 6:- Fusion center extract the statistical test and distributed the features to each SU with

high security level.

Step 7:-Fusion-center used CCA method used to test local and global and finds the new

space for channel allocation.

Data Transaction

Previous result based on, channel is selected and it ready to transactions the secure

data from one channel to another channel but while transfer data security ,energy level is not

that much efficient so to overcome that certain secure energy aware spectrum sensing

International Journal of Pure and Applied Mathematics Special Issue

1631

Page 8: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

transaction methods are used in the phase. While transfer the data energy level should

effectively use .so the transformation the data security, speed, time and energy level should

be calculated. While transfer the data certain methods should be takes place, and verified the

security signature.

Secure Energy Awareness Spectrum Sensing Transaction scheme (SESST)

Step 1:- The channel is ready to transact the secure data

Step 2:- Energy level is efficiently calculated by Energy Efficient Secure Transaction

methods

Step 3:- For Energy Efficient CR security and weighted method combined and gets the miss

detection.

Step 4:- during transaction progression is being verified the security signature like that

contain cryptography signature and bond signatures, both are verified.

The CR security transmission channel capacity of correct detection is calculated using

the formula 𝑠𝑐𝑑𝑐 = 𝐵𝑙𝑜𝑔2 1 +𝑃𝑐𝑠𝑚𝑕

𝑁0𝐵 . After calculating it weighted transmission capacity of

CD is found using another formula𝐶𝑤𝑑 (𝑤𝑒𝑖𝑔 𝑕𝑡𝑒𝑑 ) = 𝐵𝑙𝑜𝑔2 1 +𝑃𝑐𝑠𝑚𝑕

𝑁0𝐵 𝑃 𝐻0

𝐻0 𝑃(𝐻0). Then

the transmission capacity of misdetection is calculated with 𝐶𝑚𝑑 = 𝐵𝑙𝑜𝑔2 1 +𝑃𝑐𝑠𝑚𝑕

𝑁0𝐵+𝑃𝑝𝑕 and

also the weighted transmission capacity of misdetection is measured by making use of the

formula𝐶𝑡𝑚𝑑 (𝑤𝑒𝑖𝑔 𝑕𝑡𝑒𝑑 ) = 𝐵𝑙𝑜𝑔2 1 +𝑃𝑐𝑠𝑚𝑕

𝑁0𝐵+𝑃𝑝𝑕 𝑃 𝐻0

𝐻1 𝑃(𝐻1). Based on the miss detection

average capacity and total energy consumption is fined. Average channel capacity

𝐶𝑎𝑣𝑒 = 𝐵 𝑙𝑜𝑔2 1 +𝑃𝑐𝑠𝑚𝑕

𝑁0𝐵 1 − 𝑍𝑓 𝑃 𝐻0 + 𝑙𝑜𝑔2 1 +

𝑃𝑐𝑠𝑚𝑕

𝑁0𝐵+𝑃𝑝𝑕 𝑍𝑚𝑃(𝐻1) -> (11)

Total energy consumption

𝐸T = 𝑃𝑇𝑇𝑇 + (𝑃𝑆𝑇𝑆 + 𝐸𝑑t+ EC) ->(12)

Average energy efficiency calculated by the bit per watt

𝐴EF =𝑇𝑇𝐶𝑎𝑣𝑒/ 𝐸𝑡𝑜𝑡𝑎l ->(13)

So here energy level much better.

International Journal of Pure and Applied Mathematics Special Issue

1632

Page 9: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

Simulation Result& Discussion:

The simulation Result analysis for Secure Energy Aware Spectrum Sensing

Transaction Method (SEASST) is done by using Network Simulator 2.35. The proposed

method has Improved energy level through SEASST method by considering three parameter

like Spectrum sensing, Channel Allocation, Data transaction. In this operation Network Size

has been chosen as 1000*1000 m with 100 nodes along with wireless channel types. AODV

protocol is used to develop, proposed methods like SCAM, SFEKCCA while comparing the

existing methods like Blind-Channel-Estimation and RWSPRT. Two ray ground models are

needed for radio propagation. Constant Bit Rate is used from the source to destination

transaction service. Omni Antenna value has the Antenna model which is used for including

the interface queue type Drop Tail/Priqueue. After that the total channel used is 5 with the

simulation of time is as 200per second. The range of frequency used is 250m and 1mbps

traffic rate are used CBR traffic model. Random model is used to check mobility. MAC

protocol is 802.11 and flat grid needed by Topologic flat grid is used.

No. of Attackers

False alarm Probability for SU

International Journal of Pure and Applied Mathematics Special Issue

1633

Page 10: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

False alarm probability for PU

Detection Probability for SU

Dropping Rate for PU

CONCLUSION:

In this paper, SCAM, SFEKCCA methods have been proposed SEASST to

overcome the cognitive radio network security issues. This proposed semi machine learning

International Journal of Pure and Applied Mathematics Special Issue

1634

Page 11: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

technique is preventing CRN, to provide high efficient energy level. This simulation results

showed the performance of our proposed approach and provide the high energy awareness

by the following performance metric are used such as Secondary user (find the No. of

Attacker, false alarm, detection probability) and the Primary User is used to (find false alarm

probability and dropping rate) to get the result. The proposed method shows that the detection

probability has been improved and the dropping rate has been reduced. The SEASST method

is used for further analysis in future in the real time scenario.

References:-

[1].Jun Wu, Tiecheng Song, Cong Wang, Yue Yu, Miao Liu, Jing Hu "Robust Cooperative

Spectrum Sensing Against Probabilistic SSDF Attack in Cognitive Radio Networks”."

ISBN: 978-1-5090-5935-5 IEEEXplore, pp. 1-6, 2017.

[2].Qiao-mu JIANG1, Hui-fang CHEN‡1,2, Lei XIE1,2, Kuang WANG1,2 “On detecting

primary user emulation attack using channel impulse response in the cognitive radio

network", ”Springer link ,ISSN 2095-9230 (online),pp.1665-1676,2017.

[3].M. R. Manesh, A. Quadri, S. Subramanian, and N. Kaabouch, "An Optimized SNR

Estimation Technique Using Particle Swarm Optimization Algorithm,” IEEE Consumer

Communications and Networking Conference, pp. 1-7, 2017.

[4].W. L. Chin, T. N. Le, C. L. Tseng, W. C. Kao, C. S. Tsai and C.W. Kao, “Cooperative

detection of primary user emulation attacks based on channel-tap power in mobile cognitive

radio networks,” in Int. J. Ad Hoc and Ubiquitous Computing, Vol. 15, No. 4, pp. 263-274,

May 2014.

[5].J. Wang and I.R. Chen, “Trust-based Data Fusion Mechanism Design in Cognitive Radio

Networks," IEEE CNS Workshop on Cognitive Radio and Electromagnetic Spectrum

Security, 2014.

[6].Kun Zeng, QiHang Peng, YouXi Tang, "Mitigating spectrum sensing data falsification

attacks in hard-decision combining cooperative spectrum sensing", Science China

Information Sciences April 2014, Volume 57, Issue 4, pp 1-9.

[7].Saduyu, Y.E. Securing Cognitive Radio Networks with Dynamic Trust against Spectrum

Sensing Data Falsification, Proceedings of IEEE Military Communications Conference,

(2014), October 6-8; Baltimore,MD.

International Journal of Pure and Applied Mathematics Special Issue

1635

Page 12: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

[8]. Chatterjee, K., De, A., & Gupta, D.: A secure and efficient authentication protocol in

wireless sensor network. Wireless Personal Communication, vol. 81(1), pp. 17-37 (2015)

[9] S. Vassaki, M. I. Poulakis, and A. D. Panagopoulos, “Spectrum leasing in cognitive radio

networks: A matching theory approach,” in 81th IEEE VTC, Glasgow, May 2015.

[10]. J. Wang, I.-R. C, J. J. P. Tsai and D.-C. Wang, “Trust-based cooperative spectrum

sensing against SSDF attacks in distributed cognitive radio networks,” IEEE International

Workshop Technical Committee on Communications Quality and Reliability, 2016.

BIOGRAPHY

Ms .Priya. N received B.Sc degree in Information Technology under

Mother Teresa Women’s University, Kodaikanal. M.Sc (CS) and

M.Phil under Bharathir University respectively, Currently Pursuing

Ph.D (Full Time) form Dr N.G.P Arts and Science College ,which is

affiliated to Bharathiar University, Coimbatore. Her research interest

includes the areas of cognitive radio, wireless security, and machine

learning.

.Dr. B. Rosiline Jeetha graduated B. Sc. (Comp. Sci.), MCA and M.

Phil., and Ph. D. from Bharathiar University, Coimbatore. At present

she is working as Head and Professor in the PG and Research

Department of Computer Science at Dr. N.G.P. Arts and Science

College, Coimbatore. Her research interest lies in the area of Data

Mining and Networks. She has 15 years of collegiate teaching and 13

years of research experience

.

International Journal of Pure and Applied Mathematics Special Issue

1636

Page 13: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

1637

Page 14: A NOVEL SECURE ENERGY EFFICIENT SPECTRUM ...A NOVEL SECURE ENERGY EFFICIENT SPECTRUM SENSING TRANSACTION MODEL TO IMPROVE THE PERFORMANCE CRN USING SEMI MACHINE LEARNING TECHNIQUES

1638