An Emergent Self-Attention LSTM Module-Based Malicious User Detection in Cognitive Radio Networks

An Emergent Self-Attention LSTM Module-Based Malicious User Detection in Cognitive Radio Networks

Sivasankari Jothiraj, M. Brindha, V Persis Jeffrey
Copyright: © 2024 |Pages: 14
DOI: 10.4018/979-8-3693-2893-4.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cognitive radio networks (CRNs) represent a dynamic and intelligent paradigm for efficient spectrum utilization by allowing unlicensed users, known as secondary users, to opportunistically access underutilized spectrum bands. However, the open and shared nature of the spectrum in CRNs exposes them to various security threats and attacks. In this context, the need for robust intrusion detection mechanisms becomes paramount to safeguard the integrity of the network. This work proposes a novel approach for detecting attackers in cognitive radio networks using a combination of self-attention mechanism and long short-term memory (LSTM) networks. The self-attention LSTM model is designed to capture complex temporal dependencies and spatial correlations in the dynamic spectrum access patterns, making it well-suited for the inherent variability and uncertainty in CRNs. The proposed approach is evaluated using real-world CRN datasets, considering various attack scenarios such as spectrum sensing data falsification and malicious spectrum access.
Chapter Preview

Complete Chapter List

Search this Book:
Reset