The design and the implementation of the byzantine attack mitigation scheme in cognitive radio ad hoc networks

dc.contributor.advisorVelempini, M.
dc.contributor.authorMapunya, Sekgoari Semaka
dc.date.accessioned2020-09-24T08:54:37Z
dc.date.available2020-09-24T08:54:37Z
dc.date.issued2019
dc.descriptionThesis ( M.Sc. (Computer Science)) -- University of Limpopo, 2019en_US
dc.description.abstractCognitive radio network, which enables dynamic spectrum access, addresses the shortage of radio spectrum caused by ever-increasing wireless technology. This allows efficient utilisation of underutilised licenced spectrum by allowing cognitive radios to opportunistically make use of available licenced spectrum. Cognitive radios (CR), also known as secondary users, must constantly sense the spectrum band to avoid interfering with the transmission of the licenced users, known as primary users. Cognitive radios must cooperate in sensing the spectrum environment to avoid environmental issues that can affect the spectrum sensing. However, cooperative spectrum sensing is vulnerable to Byzantine attacks where selfish CR falsify the spectrum reports. Hence, there is a need to design and implement a defence mechanism that will thwart the Byzantine attacks and guarantee correct available spectrum access decisions. The use of extreme studentized deviate (ESD) test together with consensus algorithms are proposed in this study to combat the results of the availability of Byzantine attack in a cognitive radio network. The ESD test was used to detect and isolate falsified reports from selfish cognitive radios during the information sharing phase. The consensus algorithm was used to combine sensing reports at each time k to arrive at a consensus value which will be used to decide the spectrum availability. The proposed scheme, known extreme studentized cooperative consensus spectrum sensing (ESCCSS), was implemented in an ad hoc cognitive radio networks environment where the use of a data fusion centre (DFC) is not required. Cognitive radios make their own data fusion and make the final decision about the availability of the spectrum on their sensed reports and reports from their neighbouring nodes without any assistance from the fusion centre. MATLAB was used to implement and simulate the proposed scheme. We compared our scheme with Attack-Proof Cooperative Spectrum Sensing to check its effectiveness in combating the effect of byzantine attack.en_US
dc.format.extentviii, 58 leavesen_US
dc.identifier.urihttp://hdl.handle.net/10386/3137
dc.language.isoenen_US
dc.relation.requiresAdobe Acrobat Readeren_US
dc.subjectCognitive radio networken_US
dc.subjectByzantine attacksen_US
dc.subjectWireless communicationsen_US
dc.subject.lcshCognitive radio networksen_US
dc.subject.lcshRadio resource management (Wireless communications)en_US
dc.subject.lcshRadio -- Packet transmissionen_US
dc.titleThe design and the implementation of the byzantine attack mitigation scheme in cognitive radio ad hoc networksen_US
dc.typeThesisen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
mapunya_ss_2019.pdf
Size:
1.7 MB
Format:
Adobe Portable Document Format
Description:
Thesis

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.61 KB
Format:
Item-specific license agreed upon to submission
Description: