Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks
Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among t...
Ausführliche Beschreibung
Autor*in: |
Vimal, S. [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2017 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media, LLC 2017 |
---|
Übergeordnetes Werk: |
Enthalten in: Cluster computing - Springer US, 1998, 22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501 |
---|---|
Übergeordnetes Werk: |
volume:22 ; year:2017 ; number:Suppl 5 ; day:21 ; month:08 ; pages:10491-10501 |
Links: |
---|
DOI / URN: |
10.1007/s10586-017-1092-0 |
---|
Katalog-ID: |
OLC2066398179 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2066398179 | ||
003 | DE-627 | ||
005 | 20230503024956.0 | ||
007 | tu | ||
008 | 200819s2017 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s10586-017-1092-0 |2 doi | |
035 | |a (DE-627)OLC2066398179 | ||
035 | |a (DE-He213)s10586-017-1092-0-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q VZ |
084 | |a 54.50$jProgrammierung: Allgemeines |2 bkl | ||
084 | |a 54.32$jRechnerkommunikation |2 bkl | ||
084 | |a 54.25$jParallele Datenverarbeitung |2 bkl | ||
100 | 1 | |a Vimal, S. |e verfasserin |4 aut | |
245 | 1 | 0 | |a Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks |
264 | 1 | |c 2017 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media, LLC 2017 | ||
520 | |a Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario. | ||
650 | 4 | |a PSO | |
650 | 4 | |a SSDH | |
650 | 4 | |a Stackelberg game | |
650 | 4 | |a Winner determination problem | |
650 | 4 | |a EEDM | |
700 | 1 | |a Kalaivani, L. |4 aut | |
700 | 1 | |a Kaliappan, M. |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Cluster computing |d Springer US, 1998 |g 22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501 |w (DE-627)265187907 |w (DE-600)1465290-0 |w (DE-576)9265187905 |x 1386-7857 |7 nnns |
773 | 1 | 8 | |g volume:22 |g year:2017 |g number:Suppl 5 |g day:21 |g month:08 |g pages:10491-10501 |
856 | 4 | 1 | |u https://doi.org/10.1007/s10586-017-1092-0 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_70 | ||
936 | b | k | |a 54.50$jProgrammierung: Allgemeines |q VZ |0 181569876 |0 (DE-625)181569876 |
936 | b | k | |a 54.32$jRechnerkommunikation |q VZ |0 10640623X |0 (DE-625)10640623X |
936 | b | k | |a 54.25$jParallele Datenverarbeitung |q VZ |0 181569892 |0 (DE-625)181569892 |
951 | |a AR | ||
952 | |d 22 |j 2017 |e Suppl 5 |b 21 |c 08 |h 10491-10501 |
author_variant |
s v sv l k lk m k mk |
---|---|
matchkey_str |
article:13867857:2017----::olbrtvapocomtgtnsetusnigaaiaktakndnmcpcrmloainaeocsm |
hierarchy_sort_str |
2017 |
bklnumber |
54.50$jProgrammierung: Allgemeines 54.32$jRechnerkommunikation 54.25$jParallele Datenverarbeitung |
publishDate |
2017 |
allfields |
10.1007/s10586-017-1092-0 doi (DE-627)OLC2066398179 (DE-He213)s10586-017-1092-0-p DE-627 ger DE-627 rakwb eng 004 VZ 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung bkl Vimal, S. verfasserin aut Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2017 Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario. PSO SSDH Stackelberg game Winner determination problem EEDM Kalaivani, L. aut Kaliappan, M. aut Enthalten in Cluster computing Springer US, 1998 22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501 (DE-627)265187907 (DE-600)1465290-0 (DE-576)9265187905 1386-7857 nnns volume:22 year:2017 number:Suppl 5 day:21 month:08 pages:10491-10501 https://doi.org/10.1007/s10586-017-1092-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 54.32$jRechnerkommunikation VZ 10640623X (DE-625)10640623X 54.25$jParallele Datenverarbeitung VZ 181569892 (DE-625)181569892 AR 22 2017 Suppl 5 21 08 10491-10501 |
spelling |
10.1007/s10586-017-1092-0 doi (DE-627)OLC2066398179 (DE-He213)s10586-017-1092-0-p DE-627 ger DE-627 rakwb eng 004 VZ 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung bkl Vimal, S. verfasserin aut Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2017 Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario. PSO SSDH Stackelberg game Winner determination problem EEDM Kalaivani, L. aut Kaliappan, M. aut Enthalten in Cluster computing Springer US, 1998 22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501 (DE-627)265187907 (DE-600)1465290-0 (DE-576)9265187905 1386-7857 nnns volume:22 year:2017 number:Suppl 5 day:21 month:08 pages:10491-10501 https://doi.org/10.1007/s10586-017-1092-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 54.32$jRechnerkommunikation VZ 10640623X (DE-625)10640623X 54.25$jParallele Datenverarbeitung VZ 181569892 (DE-625)181569892 AR 22 2017 Suppl 5 21 08 10491-10501 |
allfields_unstemmed |
10.1007/s10586-017-1092-0 doi (DE-627)OLC2066398179 (DE-He213)s10586-017-1092-0-p DE-627 ger DE-627 rakwb eng 004 VZ 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung bkl Vimal, S. verfasserin aut Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2017 Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario. PSO SSDH Stackelberg game Winner determination problem EEDM Kalaivani, L. aut Kaliappan, M. aut Enthalten in Cluster computing Springer US, 1998 22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501 (DE-627)265187907 (DE-600)1465290-0 (DE-576)9265187905 1386-7857 nnns volume:22 year:2017 number:Suppl 5 day:21 month:08 pages:10491-10501 https://doi.org/10.1007/s10586-017-1092-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 54.32$jRechnerkommunikation VZ 10640623X (DE-625)10640623X 54.25$jParallele Datenverarbeitung VZ 181569892 (DE-625)181569892 AR 22 2017 Suppl 5 21 08 10491-10501 |
allfieldsGer |
10.1007/s10586-017-1092-0 doi (DE-627)OLC2066398179 (DE-He213)s10586-017-1092-0-p DE-627 ger DE-627 rakwb eng 004 VZ 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung bkl Vimal, S. verfasserin aut Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2017 Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario. PSO SSDH Stackelberg game Winner determination problem EEDM Kalaivani, L. aut Kaliappan, M. aut Enthalten in Cluster computing Springer US, 1998 22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501 (DE-627)265187907 (DE-600)1465290-0 (DE-576)9265187905 1386-7857 nnns volume:22 year:2017 number:Suppl 5 day:21 month:08 pages:10491-10501 https://doi.org/10.1007/s10586-017-1092-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 54.32$jRechnerkommunikation VZ 10640623X (DE-625)10640623X 54.25$jParallele Datenverarbeitung VZ 181569892 (DE-625)181569892 AR 22 2017 Suppl 5 21 08 10491-10501 |
allfieldsSound |
10.1007/s10586-017-1092-0 doi (DE-627)OLC2066398179 (DE-He213)s10586-017-1092-0-p DE-627 ger DE-627 rakwb eng 004 VZ 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung bkl Vimal, S. verfasserin aut Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC 2017 Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario. PSO SSDH Stackelberg game Winner determination problem EEDM Kalaivani, L. aut Kaliappan, M. aut Enthalten in Cluster computing Springer US, 1998 22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501 (DE-627)265187907 (DE-600)1465290-0 (DE-576)9265187905 1386-7857 nnns volume:22 year:2017 number:Suppl 5 day:21 month:08 pages:10491-10501 https://doi.org/10.1007/s10586-017-1092-0 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 54.50$jProgrammierung: Allgemeines VZ 181569876 (DE-625)181569876 54.32$jRechnerkommunikation VZ 10640623X (DE-625)10640623X 54.25$jParallele Datenverarbeitung VZ 181569892 (DE-625)181569892 AR 22 2017 Suppl 5 21 08 10491-10501 |
language |
English |
source |
Enthalten in Cluster computing 22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501 volume:22 year:2017 number:Suppl 5 day:21 month:08 pages:10491-10501 |
sourceStr |
Enthalten in Cluster computing 22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501 volume:22 year:2017 number:Suppl 5 day:21 month:08 pages:10491-10501 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
PSO SSDH Stackelberg game Winner determination problem EEDM |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Cluster computing |
authorswithroles_txt_mv |
Vimal, S. @@aut@@ Kalaivani, L. @@aut@@ Kaliappan, M. @@aut@@ |
publishDateDaySort_date |
2017-08-21T00:00:00Z |
hierarchy_top_id |
265187907 |
dewey-sort |
14 |
id |
OLC2066398179 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2066398179</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503024956.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10586-017-1092-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2066398179</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10586-017-1092-0-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.50$jProgrammierung: Allgemeines</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.32$jRechnerkommunikation</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.25$jParallele Datenverarbeitung</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vimal, S.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media, LLC 2017</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">PSO</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SSDH</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Stackelberg game</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Winner determination problem</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">EEDM</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kalaivani, L.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaliappan, M.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Cluster computing</subfield><subfield code="d">Springer US, 1998</subfield><subfield code="g">22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501</subfield><subfield code="w">(DE-627)265187907</subfield><subfield code="w">(DE-600)1465290-0</subfield><subfield code="w">(DE-576)9265187905</subfield><subfield code="x">1386-7857</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:22</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:Suppl 5</subfield><subfield code="g">day:21</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:10491-10501</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10586-017-1092-0</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.50$jProgrammierung: Allgemeines</subfield><subfield code="q">VZ</subfield><subfield code="0">181569876</subfield><subfield code="0">(DE-625)181569876</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.32$jRechnerkommunikation</subfield><subfield code="q">VZ</subfield><subfield code="0">10640623X</subfield><subfield code="0">(DE-625)10640623X</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.25$jParallele Datenverarbeitung</subfield><subfield code="q">VZ</subfield><subfield code="0">181569892</subfield><subfield code="0">(DE-625)181569892</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">22</subfield><subfield code="j">2017</subfield><subfield code="e">Suppl 5</subfield><subfield code="b">21</subfield><subfield code="c">08</subfield><subfield code="h">10491-10501</subfield></datafield></record></collection>
|
author |
Vimal, S. |
spellingShingle |
Vimal, S. ddc 004 bkl 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung misc PSO misc SSDH misc Stackelberg game misc Winner determination problem misc EEDM Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks |
authorStr |
Vimal, S. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)265187907 |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1386-7857 |
topic_title |
004 VZ 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung bkl Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks PSO SSDH Stackelberg game Winner determination problem EEDM |
topic |
ddc 004 bkl 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung misc PSO misc SSDH misc Stackelberg game misc Winner determination problem misc EEDM |
topic_unstemmed |
ddc 004 bkl 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung misc PSO misc SSDH misc Stackelberg game misc Winner determination problem misc EEDM |
topic_browse |
ddc 004 bkl 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung misc PSO misc SSDH misc Stackelberg game misc Winner determination problem misc EEDM |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Cluster computing |
hierarchy_parent_id |
265187907 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Cluster computing |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)265187907 (DE-600)1465290-0 (DE-576)9265187905 |
title |
Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks |
ctrlnum |
(DE-627)OLC2066398179 (DE-He213)s10586-017-1092-0-p |
title_full |
Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks |
author_sort |
Vimal, S. |
journal |
Cluster computing |
journalStr |
Cluster computing |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2017 |
contenttype_str_mv |
txt |
container_start_page |
10491 |
author_browse |
Vimal, S. Kalaivani, L. Kaliappan, M. |
container_volume |
22 |
class |
004 VZ 54.50$jProgrammierung: Allgemeines bkl 54.32$jRechnerkommunikation bkl 54.25$jParallele Datenverarbeitung bkl |
format_se |
Aufsätze |
author-letter |
Vimal, S. |
doi_str_mv |
10.1007/s10586-017-1092-0 |
normlink |
181569876 10640623X 181569892 |
normlink_prefix_str_mv |
181569876 (DE-625)181569876 10640623X (DE-625)10640623X 181569892 (DE-625)181569892 |
dewey-full |
004 |
title_sort |
collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on casg modeling in wireless cognitive radio networks |
title_auth |
Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks |
abstract |
Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario. © Springer Science+Business Media, LLC 2017 |
abstractGer |
Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario. © Springer Science+Business Media, LLC 2017 |
abstract_unstemmed |
Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario. © Springer Science+Business Media, LLC 2017 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_70 |
container_issue |
Suppl 5 |
title_short |
Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks |
url |
https://doi.org/10.1007/s10586-017-1092-0 |
remote_bool |
false |
author2 |
Kalaivani, L. Kaliappan, M. |
author2Str |
Kalaivani, L. Kaliappan, M. |
ppnlink |
265187907 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s10586-017-1092-0 |
up_date |
2024-07-04T04:26:53.899Z |
_version_ |
1803621198887649280 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2066398179</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503024956.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10586-017-1092-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2066398179</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s10586-017-1092-0-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.50$jProgrammierung: Allgemeines</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.32$jRechnerkommunikation</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.25$jParallele Datenverarbeitung</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vimal, S.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media, LLC 2017</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Cognitive radio networks being a promising technology among the wireless devices where dynamic spectrum access by secondary users to utilize the scarce spectrum among the Primary spectrum owners (PSO). The spectrum is being masqueraded and secondary users occupants are attacked, one among the vulnerability issue is spectrum sensing data hijack (SSDH). We have proposed a combinatorial auction based schema to allocate the spectrum to secondary users based on combined auction multi stage stackelberg game has been invoked to analyse the spectrum, the winner has been allocated the spectrum based on greedy approach. The SSDH attack has been mitigated using the neighbor monitoring approach and the revealed approach makes the prone free allocation and improves the secrecy rate of the Spectrum. The competitors of secondary users are allocated with ideal spectrum based greedy winning approach. The Primary Spectrum owners perform a recall approach if the residing primary users inside PSO have wide scarcity towards the spectrum. The allotted spectrum of winner from the corresponding secondary users will be recalled for bidding and the spectrum will be allocated to the primary user in this recall based scenario.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">PSO</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SSDH</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Stackelberg game</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Winner determination problem</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">EEDM</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kalaivani, L.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaliappan, M.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Cluster computing</subfield><subfield code="d">Springer US, 1998</subfield><subfield code="g">22(2017), Suppl 5 vom: 21. Aug., Seite 10491-10501</subfield><subfield code="w">(DE-627)265187907</subfield><subfield code="w">(DE-600)1465290-0</subfield><subfield code="w">(DE-576)9265187905</subfield><subfield code="x">1386-7857</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:22</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:Suppl 5</subfield><subfield code="g">day:21</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:10491-10501</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s10586-017-1092-0</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.50$jProgrammierung: Allgemeines</subfield><subfield code="q">VZ</subfield><subfield code="0">181569876</subfield><subfield code="0">(DE-625)181569876</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.32$jRechnerkommunikation</subfield><subfield code="q">VZ</subfield><subfield code="0">10640623X</subfield><subfield code="0">(DE-625)10640623X</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.25$jParallele Datenverarbeitung</subfield><subfield code="q">VZ</subfield><subfield code="0">181569892</subfield><subfield code="0">(DE-625)181569892</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">22</subfield><subfield code="j">2017</subfield><subfield code="e">Suppl 5</subfield><subfield code="b">21</subfield><subfield code="c">08</subfield><subfield code="h">10491-10501</subfield></datafield></record></collection>
|
score |
7.399766 |