Security enhancement technique in cognitive networks

2018 ◽  
Vol 12 (1) ◽  
pp. 71-75 ◽  
Author(s):  
Natasha Saini ◽  
Nitin Pandey ◽  
Ajeet Pal Singh
2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

Relay selection is proposed in this paper as an efficient solution to secure information transmission of secondary users against eavesdroppers in energy harvesting cognitive networks. The proposed relay selection method selects a secondary relay among available secondary relays, which are capable of harvesting radio frequency energy in signals of the secondary transmitter and correctly restore secondary message, to curtail signal-to-noise ratio at the wire-tapper. In order to evaluate the security performance of the suggested relay selection method, an exact intercept outage probability formula accounting for peak transmit power confinement, Rayleigh fading, and interference power confinement is firstly derived. Monte-Carlo simulations are then generated to corroborate the proposed formula. Numerous results expose that positions of relays, the number of relays, and parameters of the energy harvesting method significantly influence the security performance while the power confinements on secondary transmitters cause the performance saturation.


2021 ◽  
Vol 9 (01) ◽  
pp. 127-132
Author(s):  
Sourabh Saroha ◽  

Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and stretch, commencing from hackers. The coordination supervisor is in authority for safekeeping the Linux packet. Underneath maximum system formations, operator appellations, open sesame, FTP / tel-net / r-sh guidelines and relocated documentations be able to be seized by everyone programmed in the identical environment. To overcome this problem the user or the server can use secure shell, secure FTP, or file transfer protocol with transport layer security. The operating system can be protected more securely by using the above protocols. The security of the linux modules can be protected by using security enhancement technique, trappings numerous measures to avert unlicensed coordination convention. The safe keeping structural design rummage-sale is called Flask, and delivers a spotless different protection strategy and implementation. This paper is a gestalt of the Flask architecture and the execution in Linux.


Author(s):  
Masahiro OHISHI ◽  
Fumio OHTOMO ◽  
Masaaki YABE ◽  
Mitsuru KANOKOGI ◽  
Takaaki SAITO ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document