<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Comparative Analysis of Secure Spectrum Sensing in Congnitive Radio</title>
  </titleInfo>
  <name type="personal">
    <namePart>Mari, Mukhtiar Ali  09MCSE13 Supervisor - Dr. Imtiaz Ali Halepoto</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Department of Computer System Engineering</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <originInfo>
    <place>
      <placeTerm type="text">Nawabshah</placeTerm>
    </place>
    <publisher>QUEST</publisher>
    <dateIssued>2019</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <physicalDescription>
    <extent>35p.</extent>
  </physicalDescription>
  <note>ABSTRACT
Spectrum sensing is one of the emerging techniques particular\y in cognitive radio (CR). In many applications such as wireless sensor networks, the device could be attacked to a
CR in order to find out the free spectrum. The technique uses the free bands without affecting  the  legitimate  users.  One  of  the  most  com on  attacks  is the  primary  user' emulation (PUE).. Where, an attacker uses the available resource while duplicating the features of a valid user. In order to minimize the PUE attack the transmitter verification is necessary. For. that while using the CR, location verifers are used. Based on the verification these .location verifers the allocation of resources is granted to the valid users.
This work evaluates the famous transmitter verification schemes called Distance Difference Ratio (DDT) and Distance Ratio Test (DRT). A scenario is proposed on which attacker, primary user and the location verifers are configured. Through expensive experiments of 81 simulations it is observed that the DDT is a promising technique to minimize the PUE when compared with the DRT. The attacker detection rate on average of DRT is 11.1o/o and DDT is 25.9% in the given scenario. Further, the location-based schemes can be used in future with CR for more accurate detection of the PUE attack.</note>
  <identifier type="uri">http://tinyurl.com/3mu2tay8</identifier>
  <location>
    <url>http://tinyurl.com/3mu2tay8</url>
  </location>
  <recordInfo/>
</mods>
