International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 148 - Issue 1 |
Published: Aug 2016 |
Authors: Neha P. Gogulwar, Ashish R. Manusmare |
![]() |
Neha P. Gogulwar, Ashish R. Manusmare . An Attack Aware Cross Layer Routing Protocol for Multi-hop Cognitive Radio Network. International Journal of Computer Applications. 148, 1 (Aug 2016), 39-42. DOI=10.5120/ijca2016910997
@article{ 10.5120/ijca2016910997, author = { Neha P. Gogulwar,Ashish R. Manusmare }, title = { An Attack Aware Cross Layer Routing Protocol for Multi-hop Cognitive Radio Network }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 148 }, number = { 1 }, pages = { 39-42 }, doi = { 10.5120/ijca2016910997 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Neha P. Gogulwar %A Ashish R. Manusmare %T An Attack Aware Cross Layer Routing Protocol for Multi-hop Cognitive Radio Network%T %J International Journal of Computer Applications %V 148 %N 1 %P 39-42 %R 10.5120/ijca2016910997 %I Foundation of Computer Science (FCS), NY, USA
Cognitive Radio Networks (CRNs) with such spectrum aware devices is a confident key to the spectrum insufficiency issue in wireless communication area. In this, an effective routing solution with a cross layer design is proposed for the multi-hop CRNs. The existing work uses Ad-hoc On-demand Distance Vector (AODV) routing protocol for CRNs. In cognitive radio based networks there are cross layer attack which occur due to DDOS (Distributed Denial of Attack) because of this attack efficiency is reduce. DDOS attacks which occur on cross layer routing is the biggest issue in cognitive radio . In this scheme present work is on layer for attack removal in the cross layer networks which will allow the system to offer high efficiency in routing even under attacks This will help the network to perform effective routing even if DDOS attack occur. MATLAB simulation result shows the parameter: Energy, Throughput and Delay this parameter signified graphically which shows result with attack and after removing attack the system efficiency is enhanced.