Secure Data Transmission by Detecting Different Attacks in CRN to improve the Throughput
Anand Ashok Khatri1, Yogesh Kumar Sharama2, Satish Ramchandra Todmal3

1Anand Ashok Khatri, Research Scholar, HOD, Research Coordinator, Shri. JJT University, Churella, Jhunjhunu (Rajasthan) Engineering and Research, Pune, Maharashtra, India.
2Yogesh Kumar Sharama, Research Scholar, HOD, Research Coordinator, Shri. JJT University, Churella, Jhunjhunu (Rajasthan) Engineering and Research, Pune, Maharashtra, India.
3Satish Ramchandra Todmal, Research Scholar, HOD, Research Coordinator, Shri. JJT University, Churella, Jhunjhunu (Rajasthan) Engineering and Research, Pune, Maharashtra, India.
Manuscript received on November 21, 2019. | Revised Manuscript received on December 30, 2019. | Manuscript published on December 30, 2019. | PP: 5488-5494  | Volume-9 Issue-2, December, 2019. | Retrieval Number: B3498129219/2019©BEIESP | DOI: 10.35940/ijeat.B3498.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.
Keywords: Cognitive Radio, Cognitive Radio Network, Channel allocation, Protocol, security.