dc.contributor.author |
Rahman, Mohammad Hanif |
|
dc.contributor.author |
Hossain, Md. Meraz |
|
dc.date.accessioned |
2015-07-14T07:29:09Z |
|
dc.date.available |
2015-07-14T07:29:09Z |
|
dc.date.issued |
8/1/2015 |
|
dc.identifier.uri |
http://dspace.ewubd.edu/handle/2525/1306 |
|
dc.description |
This thesis submitted in partial fulfillment of the requirements for the degree of Masters of Science in Telecommunication Engineering of East West University, Dhaka, Bangladesh |
en_US |
dc.description.abstract |
In Cognitive Radio Networks the primary goal of the secondary users is to detect the presence of primary user. Different types of detection techniques are prevalent like average energy detection of sample data, matched filter based energy detection and Bayesian approach of prior and posterior modeling of average signal. The situation becomes cumbersome in case of presence of malicious users especially primary user emulator. In this project work we deal with detection of primary user emulator attack (PUEA) based on threshold energy detection model where exponential path loss model is used in a small region, where both secondary user and PUEA are randomly distributed and Okumura-Hata model for long links of secondary user and primary user.
Finally we plot the lower bound of probability of PUEA against unoccupied distance of PUEA. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
East West University |
en_US |
dc.relation.ispartofseries |
;ECE00030 |
|
dc.subject |
In Cognitive Radio Network |
en_US |
dc.title |
Primary User Emulation Attack (PUEA) In Cognitive Radio Network (CRN) |
en_US |
dc.type |
Thesis |
en_US |