36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

In this work we recognize di erent types of attacks at di erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely a ects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly…mehr

Produktbeschreibung
In this work we recognize di erent types of attacks at di erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely a ects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA).
Autorenporträt
The author is pursuing PhD in Computer Science at University of Kashmir, Srinagar. She has been awarded M.Tech in CSE from Shri Mata Vaishno Devi University, Jammu and B.Tech in CSE from University of Kashmir, Srinagar.