21 research outputs found

    Secure MAC protocols for cognitive radio networks

    Get PDF
    A thesis submitted in partial fulfilment for the degree of Doctor of PhilosophyWith the rapid increase in wireless devices, an effective improvement in the demand of efficient spectrum utilisation for gaining better connectivity is needed. Cognitive Radio (CR) is an emerging technology that exploits the inefficient utilisation of the unused spectrum dynamically. Since spectrum sharing is responsible for coordinating channels’ access for Cognitive Users (CUs), the Common Control Channel (CCC) is one of the existing methods used to exchange the control information between CUs. However, the unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats targeting spectrum sensing, spectrum management, spectrum sharing, and spectrum mobility leading to the deterioration of the network performance. Thus, protection and detection security mechanisms are essential to maintaining the CRNs. This thesis presents a novel decentralised CR MAC protocol that successfully utilises the unused portion of the licensed band. The protocol achieves improved performance; communication time and throughput when compared to two benchmark protocols. Less communication time and higher throughput are accomplished by the protocol due to performing fast switching to the selected available data channel for initiating data transmission. The proposed protocol is then extended to two different versions based on two authentication approaches applied to it; one using Digital Signature and another is based on Shared-Key. The two proposed secure protocols address the security requirements in CRNs leading to subsequent secure communication among CUs. The protocols function effectively in providing defence against several attacks related to the MAC layer such as; Spectrum Sensing Data Manipulation/Falsification, Data Tempering and Modification, Jamming attacks, Eavesdropping, Forgery and Fake control information attacks, MAC address spoofing, and unauthorised access attacks. The associated security algorithms ensure the successful secure communication between CUs in a cooperative approach. Moreover, the security protocols are investigated and analysed in terms of security flows by launching unauthorised access and modification attacks on the transmitted information. The testing results demonstrated that two protocols perform successful detection of threats and ensure secure communication in CRNs

    Performance analysis of a novel decentralised MAC protocol for cognitive radio networks

    Get PDF
    Due to the demand of emerging Cognitive Radio (CR) technology to permits using the unused licensed spectrum parts by cognitive users (CUs) to provide opportunistic and efficient utilisation of the white spaces. This requires deploying a CR MAC with the required characteristics to coordinate the spectrum access among CUs. Therefore, this paper presents the design and implementation of a novel Medium Access Control (MAC) protocol for decentralised CRNs (MCRN). The protocol provides efficient utilisations of the unused licensed channels and enables CUs to exchange data successfully over licensed channels. This is based on the observation procedure of sensing the status of the Licensed Users (LUs) are ON or OFF over the licensed channels. The protocol is validated with the comparison procedure against two different benchmark protocols in terms of the network performance; communication time and throughput. Therefore, performance analysis demonstrated that the proposed MCRN perform better and achieve higher throughput and time benefits than the benchmarks protocols

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    A Secure LEACH-PRO Protocol Based on Blockchain

    No full text
    Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significantly fulfill the required protection, security enhancement with less energy consumption is essential to preserve the availability of resources and secure better performance. In 2020, Youssef et al. suggested a scheme called Enhanced Probabilistic Cluster Head Selection (LEACH-PRO) to extend the sensors’ lifetime in WSNs. This paper introduces a new variant of the LEACH-PRO protocol by adopting the blockchain security technique to protect WSNs. The proposed protocol (SLEACH-PRO) performs a decentralized authentication mechanism by applying a blockchain to multiple base stations to avoid system and performance degradation in the event of a station failure. The security analysis of the SLEACH-PRO is performed using Burrows–Abadi–Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, the SLEACH-PRO is evaluated and compared to related protocols in terms of computational cost and security level based on its resistance against several attacks. The comparison results showed that the SLEACH-PRO protocol is more secure and requires less computational cost compared to other related protocols

    A Machine Learning Strategy for the Quantitative Analysis of the Global Warming Impact on Marine Ecosystems

    No full text
    It is generally observed that aquatic organisms have symmetric abilities to produce oxygen (O2) and fix carbon dioxide (CO2). A simulation model with time-dependent parameters was recently proposed to better understand the symmetric effects of accelerated climate change on coastal ecosystems. Changes in environmental elements and marine life are two examples of variables that are expected to change over time symmetrically. The sustainability of each equilibrium point is examined in addition to proving the existence and accuracy of the proposed model. To support the conclusions of this research compared to other studies, numerical simulations of the proposed model and a case study are investigated. This paper proposes an integrated bibliographical analysis of artificial neural networks (ANNs) using the Reverse-Propagation with Levenberg–Marquaradt Scheme (RP-LMS) to evaluate the main properties and applications of ANNs. The results obtained by RP-LMS show how to prevent global warming by improving the management of marine fish resources. The reference dataset for greenhouse gas emissions, environmental temperature, aquatic population, and fisheries population (GAPF) is obtained by varying parameters in the numerical Adam approach for different scenarios. The accuracy of the proposed RP-LMS neural network is demonstrated using mean square error (MSE), regression plots, and best-fit output. According to RP-LMS, the current scenario of rapid global warming will continue unabated over the next 50 years, damaging marine ecosystems, particularly fish stocks

    Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective

    No full text
    Issues such as maintaining the security and integrity of data in digital healthcare are growing day-by-day in terms of size and cost. The healthcare industry needs to work on effective mechanisms to manage these concerns and prevent any debilitating crisis that might affect patients as well as the overall health management. To tackle such critical issues in a simple, feasible, and symmetrical manner, the authors considered the ideology of cybernetics. Working towards this intent, this paper proposes a symmetrical model that illustrates a compact version of the adopted ideology as a pathway for future researchers. Furthermore, the proposed ideology of cybernetics specifically focuses on how to plan the entire design concept more effectively. It is important for the designer to prepare for the future and manage the design structure from a product perspective. Therefore, the proposed ideology provides a symmetric mechanism that includes a variety of estimation and evaluation techniques as well as their management. The proposed model generates a symmetric, variety-issue, reduced infrastructure that can produce highly effective results due to an efficient usability, operatability, and symmetric operation execution which are the benefits of the proposed model. Furthermore, the study also performed a performance simulation assessment by adopting a multi-criteria decision-making approach that helped the authors compare the various existing and proposed models based on their levels of effectiveness

    On the Computational Study of a Fully Wetted Longitudinal Porous Heat Exchanger Using a Machine Learning Approach

    No full text
    The present study concerns the modeling of the thermal behavior of a porous longitudinal fin under fully wetted conditions with linear, quadratic, and exponential thermal conductivities surrounded by environments that are convective, conductive, and radiative. Porous fins are widely used in various engineering and everyday life applications. The Darcy model was used to formulate the governing non-linear singular differential equation for the heat transfer phenomenon in the fin. The universal approximation power of multilayer perceptron artificial neural networks (ANN) was applied to establish a model of approximate solutions for the singular non-linear boundary value problem. The optimization strategy of a sports-inspired meta-heuristic paradigm, the Tiki-Taka algorithm (TTA) with sequential quadratic programming (SQP), was utilized to determine the thermal performance and the effective use of fins for diverse values of physical parameters, such as parameter for the moist porous medium, dimensionless ambient temperature, radiation coefficient, power index, in-homogeneity index, convection coefficient, and dimensionless temperature. The results of the designed ANN-TTA-SQP algorithm were validated by comparison with state-of-the-art techniques, including the whale optimization algorithm (WOA), cuckoo search algorithm (CSA), grey wolf optimization (GWO) algorithm, particle swarm optimization (PSO) algorithm, and machine learning algorithms. The percentage of absolute errors and the mean square error in the solutions of the proposed technique were found to lie between 10−4 to 10−5 and 10−8 to 10−10, respectively. A comprehensive study of graphs, statistics of the solutions, and errors demonstrated that the proposed scheme’s results were accurate, stable, and reliable. It was concluded that the pace at which heat is transferred from the surface of the fin to the surrounding environment increases in proportion to the degree to which the wet porosity parameter is increased. At the same time, inverse behavior was observed for increase in the power index. The results obtained may support the structural design of thermally effective cooling methods for various electronic consumer devices

    Advancing Sustainable Healthcare through Enhanced Therapeutic Communication with Elderly Patients in the Kingdom of Saudi Arabia

    No full text
    Effective communication in nursing, particularly with older patients, is critical to providing high-quality care. The purpose of this research is to fill key gaps in the existing literature by emphasizing the importance of therapeutic communication in the setting of mental nursing care for elderly patients in Saudi Arabia. Building on the study’s foundation, which recognizes the various issues faced by cultural, religious, and linguistic diversity, this research adopted a rigorous research methodology incorporating a broad group of senior healthcare professionals as experts. We analyze various therapeutic communication approaches used by mental health nurses using extensive surveys and observations. This empirical study’s findings are likely to make a significant addition to the field by throwing light on the most efficient methods for improving nurse–elderly-patient communication. The study identifies Simulation-Based Training as the most viable technique, with potentially far-reaching implications for improving care for older patients in Saudi Arabia. This study paves the way for significant advances in healthcare practices, with a focus on mental health nursing, ultimately helping both nurses and elderly patients by developing trust, understanding, and increased communication
    corecore