Vol.42, No.2, 2022, pp.523-533, doi:10.32604/csse.2022.021433
Securing Privacy Using Optimization and Statistical Models in Cognitive Radio Networks
  • R. Neelaveni1,*, B. Sridevi2, J. Sivasankari3
1 Department of Electronics and Communication Engineering, MNM Jain Engineering College, Chennai, 60009, India
2 Department of Electronics and Communication Engineering, Velammal Institute of Technology, Chennai, 602001, India
3 Department of Electronics and Communication Engineering, Ultra College of Engineering and Technology, Madurai, 625104, India
* Corresponding Author: R. Neelaveni. Email:
Received 03 July 2021; Accepted 16 August 2021; Issue published 04 January 2022
Cognitive Radio Networks (CRN) are the possible and ideal solution for meeting the spectrum needs of next-generation communication systems. CRN is a promising alternative approach that allows spectrum sharing in many applications. The licensed users considered Primary Users (PU) and unlicensed users as Secondary Users (SU). Time and power consumption on security issues are considered degrading factors in performance for improving the Quality of Service (QoS). Irrespective of using different optimization techniques, the same methodology is to be updated for the task. So that, learning and optimization go hand in hand. It ensures the security in CRN, risk factors in spectrum sharing to SU for secure communication. The objective of the proposed work is to preserve the location of the SU from attackers and attain the clustering of SU to utilize the resource. Ant Colony Optimization (ACO) is implemented to increase the overall efficiency and utilization of the CRN. ACO is used to form clusters of SUs in the co-operative spectrum sensing technique. This paper deals with threat detection and classifying threats using parameters such as unlikability, context privacy, anonymity, conditional traceability, and trade-off. In this privacy-preserving model, overall accuracy is 97.4%, and it is 9% higher than the conventional models without Privacy-Preserving Architecture (PPA).
Attacks; secondary users; cognitive radio networks; security
Cite This Article
R. Neelaveni, B. Sridevi and J. Sivasankari, "Securing privacy using optimization and statistical models in cognitive radio networks," Computer Systems Science and Engineering, vol. 42, no.2, pp. 523–533, 2022.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.