{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T11:08:22Z","timestamp":1724411302727},"reference-count":21,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"abstract":"<jats:p>Cognitive Radio Network Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. This paper is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. This paper solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of NBA is to minimize two fitness functions namely non-linear least square and the maximum likelihood in order to optimize the estimation error. After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation and Particle Swarm Optimization.<\/jats:p>","DOI":"10.4018\/ijwnbt.2017070101","type":"journal-article","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T21:52:48Z","timestamp":1520027568000},"page":"1-25","source":"Crossref","is-referenced-by-count":4,"title":["Detection of PUE Attack in CRN with Reduced Error in Location Estimation Using Novel Bat Algorithm"],"prefix":"10.4018","volume":"6","author":[{"given":"Aasia","family":"Rehman","sequence":"first","affiliation":[{"name":"Kashmir University, Srinagar, India"}]},{"given":"Deo","family":"Prakash","sequence":"additional","affiliation":[{"name":"Shri Mata Vaishno Devi University, Katra, India"}]}],"member":"2432","reference":[{"key":"IJWNBT.2017070101-0","unstructured":"Binitha, S, & Sathya, S. S. (2012). A Survey of Bio Inspired Optimization Algorithms. International Journal of Soft Computing and Engineering, 2(2), 137-151."},{"key":"IJWNBT.2017070101-1","doi-asserted-by":"publisher","DOI":"10.1109\/SDR.2006.4286333"},{"issue":"1","key":"IJWNBT.2017070101-2","doi-asserted-by":"crossref","DOI":"10.1109\/JSAC.2008.080104","article-title":"Defense against Primary User Emulation Attacks in Cognitive Radio Networks.","volume":"26","author":"R.Chen","year":"2008","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"IJWNBT.2017070101-3","unstructured":"Ghanem, W. R., Shokir, M., & Dessoky, M. (2016). Defense against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code.International Journal of Electronics and Information Engineering, 4(1)."},{"key":"IJWNBT.2017070101-4","unstructured":"El-Hajj, W., Safa, H. & Guizani, M. (2011). Survey of Security Issues in Cognitive Radio Networks. Journal of Internet Technology, 12."},{"key":"IJWNBT.2017070101-5","doi-asserted-by":"publisher","DOI":"10.1109\/NRSC.2016.7450851"},{"key":"IJWNBT.2017070101-6","article-title":"Selfish Attacks and Detection in Cognitive Radio Ad-hoc Networks.","author":"M.Jo","year":"2013","journal-title":"IEEE Network, 27(3), 46-50."},{"key":"IJWNBT.2017070101-7","unstructured":"Kamath, H. S., & Schalk, L. M. (2014). Primary User Localization Schemes in Cooperative Sensing. International Journal of Computer Applications, 105(13)."},{"key":"IJWNBT.2017070101-8","doi-asserted-by":"crossref","unstructured":"Leon, O., Hernandez-Serrano, J., & Soriano, M. (2012). Cooperative Detection of Primary User Emulation Attacks in CRNs. Computer Networks, 56(14), 3374-3384.","DOI":"10.1016\/j.comnet.2012.05.008"},{"key":"IJWNBT.2017070101-9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.112310.100630"},{"key":"IJWNBT.2017070101-10","doi-asserted-by":"crossref","unstructured":"Meng, X. B., Gao, X. Z., Liu, Y., & Zhang, H. (2015). A novel bat algorithm with habitat selection and Doppler effect in echoes for optimization. Expert Systems with Applications, 42(17-18), 6350-6364.","DOI":"10.1016\/j.eswa.2015.04.026"},{"key":"IJWNBT.2017070101-11","unstructured":"Niranchana, P. V., & Yamni, K. A. P. (2014). Credit Risk Value Based Detection of Multiple Selfish Node Attacks in Cognitive Radio Networks. IJRET: International Journal of Research in Engineering and Technology, 3."},{"issue":"4","key":"IJWNBT.2017070101-12","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MSP.2005.1458287","article-title":"Locating the nodes: Cooperative localization in wireless sensor networks.","volume":"22","author":"N.Patwari","year":"2005","journal-title":"IEEE Signal Processing Magazine"},{"key":"IJWNBT.2017070101-13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2316831"},{"key":"IJWNBT.2017070101-14","unstructured":"Shen, G., Zetik, R., & Thorma, R. S. (2008). Performance Comparison of TOA and TDOA Based Location Estimation Algorithms in LOS Environment. IEEE Proceedings of the 5th Workshop on Positioning, Navigation and Communication."},{"key":"IJWNBT.2017070101-15","doi-asserted-by":"publisher","DOI":"10.1002\/9781118104750.ch2"},{"issue":"5","key":"IJWNBT.2017070101-16","article-title":"Detection of PUE Attacks in Cognitive Radio Networks Based on Signal Activity Pattern.","volume":"13","author":"C.Xin","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"IJWNBT.2017070101-17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12538-6_6"},{"key":"IJWNBT.2017070101-18","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7166193"},{"key":"IJWNBT.2017070101-19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121102"},{"key":"IJWNBT.2017070101-20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121102"}],"container-title":["International Journal of Wireless Networks and Broadband Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=201494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T08:39:40Z","timestamp":1651826380000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJWNBT.2017070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":21,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijwnbt.2017070101","relation":{},"ISSN":["2155-6261","2155-627X"],"issn-type":[{"value":"2155-6261","type":"print"},{"value":"2155-627X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7]]}}}