A survey on cognitive radio network attack mitigation using machine learning and blockchain

IE Ezhilarasi, JC Clement, JM Arul - EURASIP Journal on Wireless …, 2023 - Springer
Cognitive radio network is a promising technology to enhance the spectrum utilization and to
resolve the spectrum scarcity issues. But the malicious users play havoc with the network …

Employing machine learning based malicious signal detection for cognitive radio networks

Y Turkyilmaz, A Senturk… - … : Practice and Experience, 2023 - Wiley Online Library
In cognitive radio networks, the empty spectrum that is also named as spectrum hole is
detected with the help of spectrum sensing techniques. Energy detection is the most utilized …

DRL-Based Maximization of the Sum Cross-Layer Achievable Rate for Networks Under Jamming

A Basit, M Rahim, TN Do, N Adam… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
In quasi-static wireless networks characterized by infrequent changes in the transmission
schedules of user equipment (UE), malicious jammers can easily deteriorate network …

A Novel Approach Based on Machine Learning, Blockchain and Decision Process for Securing Smart Grid

NT Chibi, OA Oualhaj, WF Fihri, H El Ghazi - IEEE Access, 2024 - ieeexplore.ieee.org
Smart Grids (SGs) rely on advanced technologies, generating significant data traffic across
the network, which plays a crucial role in various tasks such as electricity consumption …

Monitoring and enhancing the co-operation of IoT network rhrough scheduling function based punishment reward strategy

AR Sangi, B Li, S Anamalamudi, A Carie - PloS one, 2024 - journals.plos.org
The Internet of Things (IoT) has revolutionized the connectivity of physical devices, leading
to an exponential increase in multimedia wireless traffic and creating substantial demand for …

Discrimination of primary user emulation attack on cognitive radio networks using machine learning based spectrum sensing scheme

C Ambhika - Wireless Networks, 2024 - Springer
The identification of the presence of primary user enhances the spectrum efficiency in
cognitive radio (CR). The studies suggested that the existence of malicious user adversely …

DRL-Based Dynamic Channel Access and SCLAR Maximization for Networks Under Jamming

A Basit, M Rahim, G Kaddoum, TN Do… - ar** Attacks in Autonomous Multihop Wireless Networks
J Konorski, S Szott - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Multihop wireless networks with autonomous nodes are susceptible to selfish traffic
remap** attacks (TRAs). Nodes launching TRAs leverage the underlying channel access …