Open Access

ARTICLE

Securing Privacy Using Optimization and Statistical Models in Cognitive Radio Networks

R. Neelaveni1,*, B. Sridevi2, J. Sivasankari3
1 Department of Electronics and Communication Engineering, MNM Jain Engineering College, Chennai, 60009, India
2 Department of Electronics and Communication Engineering, Velammal Institute of Technology, Chennai, 602001, India
3 Department of Electronics and Communication Engineering, Ultra College of Engineering and Technology, Madurai, 625104, India
* Corresponding Author: R. Neelaveni. Email:

Computer Systems Science and Engineering 2022, 42(2), 523-533. https://doi.org/10.32604/csse.2022.021433

Received 03 July 2021; Accepted 16 August 2021; Issue published 04 January 2022

Abstract

Cognitive Radio Networks (CRN) are the possible and ideal solution for meeting the spectrum needs of next-generation communication systems. CRN is a promising alternative approach that allows spectrum sharing in many applications. The licensed users considered Primary Users (PU) and unlicensed users as Secondary Users (SU). Time and power consumption on security issues are considered degrading factors in performance for improving the Quality of Service (QoS). Irrespective of using different optimization techniques, the same methodology is to be updated for the task. So that, learning and optimization go hand in hand. It ensures the security in CRN, risk factors in spectrum sharing to SU for secure communication. The objective of the proposed work is to preserve the location of the SU from attackers and attain the clustering of SU to utilize the resource. Ant Colony Optimization (ACO) is implemented to increase the overall efficiency and utilization of the CRN. ACO is used to form clusters of SUs in the co-operative spectrum sensing technique. This paper deals with threat detection and classifying threats using parameters such as unlikability, context privacy, anonymity, conditional traceability, and trade-off. In this privacy-preserving model, overall accuracy is 97.4%, and it is 9% higher than the conventional models without Privacy-Preserving Architecture (PPA).

Keywords

Attacks; secondary users; cognitive radio networks; security

Cite This Article

R. Neelaveni, B. Sridevi and J. Sivasankari, "Securing privacy using optimization and statistical models in cognitive radio networks," Computer Systems Science and Engineering, vol. 42, no.2, pp. 523–533, 2022.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 666

    View

  • 384

    Download

  • 0

    Like

Share Link

WeChat scan