47
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Modified light GBM based classification of malicious users in cooperative cognitive radio networks

, , ORCID Icon &
Pages 104-122 | Received 19 Oct 2021, Accepted 10 Oct 2022, Published online: 17 Nov 2022

References

  • Chatterjee S, Maity SP, Acharya T. Energy efficiency in cooperative cognitive radio network in the presence of malicious users. IEEE Syst J. 2016 Dec 19; 12(3):2197–2206.
  • Kaligineedi P, Khabbazian M, Bhargava VK. Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transact Wireless Communicat. 2010 Jun 28; 9(8):2488–2497.
  • Khan MS, Gul N, Kim J, et al. A genetic algorithm-based soft decision fusion scheme in cognitive IoT networks with malicious users. Wirel. Commun. Mob. Comput. 2020 ;2020:1–10. Jan 31.
  • Ahmed A, Khan MS, Gul N, et al. A comparative analysis of different outlier detection techniques in cognitive radio networks with malicious users. Wirel. Commun. Mob. Comput. 2020 [Dec 9];2020:1–18.
  • Arun S, Umamaheswari G. An adaptive learning-based attack detection technique for mitigating primary user emulation in cognitive radio networks. Circuit Syst Signal Proc. 2020 Feb;39(2):1071–1088.
  • Cadena Muñoz E, Pedraza Martínez LF, Ortiz Triviño JE. Detection of malicious primary user emulation based on a support vector machine for a mobile cognitive radio network using software-defined radio. Electronics. 2020 Aug;9(8):1282.
  • Armi N, Gharibi W, Khan WZ. Error rate detection due to primary user emulation attack in cognitive radio networks. Int. J. Electr. Comput. Eng. 2020 Oct 1. 10. 5. 5385
  • Dai J, Liu J, Pan C, et al. Mac-based energy efficiency in cooperative cognitive radio network in the presence of malicious users. IEEE Access. 2018 Jan 15; 6:5666–5677
  • Magdalene AH, Thulasimani L. Analysis of spectrum sensing data falsification (SSDF) attack in cognitive radio networks: a survey. J. Eng. Educ. 2017;2:89–100.
  • Lavanis N, Jalihal D. Performance of p -norm detector in cognitive radio networks with cooperative spectrum sensing in presence of malicious users. Wirel. Commun. Mob. Comput. 2017 Jan 1 2017 2017.
  • Sundararaj V. Optimal task assignment in mobile cloud computing by the queue-based ant-bee algorithm. Wireless Pers Commun. 2019;104(1):173–197.
  • Sundararaj V, Selvi M. Opposition grasshopper optimizer-based multimedia data distribution using user evaluation strategy. Multimed Tools Appl. 2021;80(19):29875–29891.
  • Jose J, Gautam N, Tiwari M, et al. An image quality enhancement scheme employing an adolescent identity search algorithm in the NSST domain for multimodal medical image fusion. Biomed Signal Process Control. 2021;66:102480.
  • Ravikumar S, Kavitha D. A new adaptive hybrid mutation black widow clustering based data partitioning for big data analysis. Wireless Pers Commun. 2021;1–27.
  • Jeyalakshmi S, Sekar S, Ravikumar S, et al. Random forest-based oppositional henry gas solubility optimization model for service attack improvement in WSN. In: Journal of the institution of engineers. (India): Series B; 2022. p. 1–12.
  • Qin Z, Gao Y, Plumbley MD. Malicious user detection based on low-rank matrix completion in wideband spectrum sensing. IEEE Trans Signal Process. 2017 Oct 2; 66(1):5–17.
  • Gul N, Qureshi IM, Omar A, et al. History-based forward and feedback mechanism in cooperative spectrum sensing including malicious users in the cognitive radio network. PloS one. 2017 Aug 18; 12(8):e0183387.
  • Khan MS, Jibran M, Koo I, et al. A double adaptive approach to tackle malicious users in cognitive radio networks. Wirel. Commun. Mob. Comput. 2019 [Jan 1];2019:1–9.
  • Gul N, Qureshi IM, Elahi A, et al. Defense against malicious users in cooperative spectrum sensing using genetic algorithm. Int. J. Antennas Propag. 2018 [Jan 1];2018:1–11.
  • Gul N, Qureshi IM, Khan MS, et al. Differential evolution based reliable cooperative spectrum sensing in the presence of malicious users. Wireless Pers Commun. 2020 Sep;114(1):123–147.
  • Inamdar MA, Kumaraswamy HV. Accurate primary user emulation attack (PUEA) detection in cognitive radio network using KNN and ANN classifier. In2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) 2020 Jun 15 (pp. 490–495). Tirunelveli, India: IEEE.
  • Sarmah R, Taggu A, Marchang N. Detecting byzantine attack in cognitive radio networks using machine learning. Wireless Networks. 2020 Nov;26(8):5939–5950.
  • Elghamrawy SM, Hassanien AE. GWOA: a hybrid genetic whale optimization algorithm for combating attacks in the cognitive radio network. J Ambient Intell Humaniz Comput. 2019 Nov;10(11):4345–4360.
  • Khan MS, Khan L, Gul N, et al. Support vector machine-based classification of malicious users in cognitive radio networks. Wirel. Commun. Mob. Comput. 2020 [Jul 18];2020:1–11.
  • Jaglan RR, Mustafa R, Agrawal S. Scalable and robust ANN-based cooperative spectrum sensing for cognitive radio networks. Wireless Pers Commun. 2018 Apr;99(3):1141–1157.
  • Gul N, Khan MS, Kim SM, et al. Particle swarm optimization in the presence of malicious users in cognitive iot networks with data. Sci Programm. 2020 ;2020:1–11. Nov 11.
  • Chen CZ, Ma Q, Yu B Q. Lightgbm-PPI: predicting protein-protein interactions through lightgbm with multi-information fusion. Chemom. Intell. Lab. Syst. 2019; 191:54–64.
  • Tang M, Zhao Q, Ding SX, et al. An improved lightGBM algorithm for online fault detection of wind turbine gearboxes. Energies. 2020 Jan;13(4):807.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.