Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks

The cognitive radio network (CR) is a primary and promising technology to distribute the spectrum assignment to an unlicensed user (secondary users) which is not utilized by the licensed user (primary user).The cognitive radio network frames a reactive security policy to enhance the energy monitorin...

Full description

Saved in:
Bibliographic Details
Published in:Neural computing & applications Vol. 32; no. 1; pp. 151 - 161
Main Authors: Vimal, S., Kalaivani, L., Kaliappan, M., Suresh, A., Gao, Xiao-Zhi, Varatharajan, R.
Format: Journal Article
Language:English
Published: London Springer London 01.01.2020
Springer Nature B.V
Subjects:
ISSN:0941-0643, 1433-3058
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The cognitive radio network (CR) is a primary and promising technology to distribute the spectrum assignment to an unlicensed user (secondary users) which is not utilized by the licensed user (primary user).The cognitive radio network frames a reactive security policy to enhance the energy monitoring while using the CR network primary channels. The CR network has a good amount of energy capacity using battery resource and accesses the data communication via the time-slotted channel. The data communication with moderate energy-level utilization during transmission is a great challenge in CR network security monitoring, since intruders may often attack the network in reducing the energy level of the PU or SU. The framework used to secure the communication is using the discrete-time partially observed Markov decision process. This system proposes a modern data communication-secured scheme using private key encryption with the sensing results, and eclat algorithm has been proposed for energy detection and Byzantine attack prediction. The data communication is secured using the AES algorithm at the CR network, and the simulation provides the best effort-efficient energy usage and security.
AbstractList The cognitive radio network (CR) is a primary and promising technology to distribute the spectrum assignment to an unlicensed user (secondary users) which is not utilized by the licensed user (primary user).The cognitive radio network frames a reactive security policy to enhance the energy monitoring while using the CR network primary channels. The CR network has a good amount of energy capacity using battery resource and accesses the data communication via the time-slotted channel. The data communication with moderate energy-level utilization during transmission is a great challenge in CR network security monitoring, since intruders may often attack the network in reducing the energy level of the PU or SU. The framework used to secure the communication is using the discrete-time partially observed Markov decision process. This system proposes a modern data communication-secured scheme using private key encryption with the sensing results, and eclat algorithm has been proposed for energy detection and Byzantine attack prediction. The data communication is secured using the AES algorithm at the CR network, and the simulation provides the best effort-efficient energy usage and security.
Author Vimal, S.
Kalaivani, L.
Kaliappan, M.
Varatharajan, R.
Gao, Xiao-Zhi
Suresh, A.
Author_xml – sequence: 1
  givenname: S.
  orcidid: 0000-0002-1467-1206
  surname: Vimal
  fullname: Vimal, S.
  email: vimal28.05.1984@gmail.com
  organization: Department of IT, National Engineering College
– sequence: 2
  givenname: L.
  surname: Kalaivani
  fullname: Kalaivani, L.
  organization: Department of EEE, National Engineering College
– sequence: 3
  givenname: M.
  surname: Kaliappan
  fullname: Kaliappan, M.
  organization: Department of IT, National Engineering College
– sequence: 4
  givenname: A.
  surname: Suresh
  fullname: Suresh, A.
  organization: Department of Computer Science and Engineering, Nehru Institute of Engineering and Technology
– sequence: 5
  givenname: Xiao-Zhi
  surname: Gao
  fullname: Gao, Xiao-Zhi
  organization: School of Computing, University of Eastern Finland
– sequence: 6
  givenname: R.
  surname: Varatharajan
  fullname: Varatharajan, R.
  organization: Department of Electronics and Communication Engineering, Sri Ramanujar Engineering College
BookMark eNp9kVtvFCEYhompSbfVH9A7kl6PcprDXja1B5Mab-w1-QY-VtoZGIHdpv6h_k1Z18Skid5AAs_DC7wn5CjEgISccfaBM9Z_zIy1gjeMD43shzq8ISuupGwka4cjsmJrVXc7JY_JSc4PjDHVDe2KvHzCHU5xmTEUGh3NaLYJLbVQgJYEIc8-Zx8D3WYfNnQG890HpBNCCnWhGSHvcZ9NwoJN8TPSBVLxME3PNI4Z064CXyA9xh2do8WJQrAUA6ZNBZZq-J9Q9hE-UBM3wRe_Q5rA-kgDlqeYHvM78tbBlPH9n_mU3F9ffbu8be6-3ny-vLhrjORdaVznFKxHbDtci86JzmLbDq5FaQQowwWsBzG6sUMFgxUWnWPorHVi7B2TRp6S88O5S4o_tpiLfojbFGqkFlIp3nOhRKX4gTIp5pzQ6SX5GdKz5kzv-9CHPnTtQ-_70LI6_SvH-PL73fWb_fRfUxzMXFPCBtPfO_1b-gXpHqem
CitedBy_id crossref_primary_10_1186_s13640_021_00559_1
crossref_primary_10_1007_s10916_019_1398_y
crossref_primary_10_1007_s11277_021_08576_z
crossref_primary_10_1007_s11277_021_08579_w
crossref_primary_10_1007_s12652_020_02144_2
crossref_primary_10_1016_j_micpro_2023_104963
crossref_primary_10_1007_s00500_020_05480_9
crossref_primary_10_1007_s11277_021_08701_y
crossref_primary_10_1007_s11277_021_08703_w
crossref_primary_10_1007_s11277_021_08704_9
crossref_primary_10_1007_s12652_020_02168_8
crossref_primary_10_1007_s00500_019_04066_4
crossref_primary_10_1007_s11227_018_2659_0
crossref_primary_10_1002_ett_4812
crossref_primary_10_1007_s11042_023_16642_w
crossref_primary_10_1007_s40998_023_00665_y
crossref_primary_10_1007_s12652_020_02087_8
crossref_primary_10_1007_s12652_020_02082_z
crossref_primary_10_1186_s13638_023_02290_z
crossref_primary_10_1007_s11277_021_08272_y
crossref_primary_10_1007_s11277_021_08277_7
crossref_primary_10_1007_s11277_021_08358_7
crossref_primary_10_1007_s12145_020_00538_6
crossref_primary_10_1007_s10916_019_1402_6
crossref_primary_10_1007_s11082_023_05796_4
crossref_primary_10_1007_s11277_021_08566_1
crossref_primary_10_1007_s00521_020_05260_4
crossref_primary_10_1007_s11235_022_00896_0
crossref_primary_10_1038_s41598_025_08677_w
crossref_primary_10_1007_s11063_020_10279_8
crossref_primary_10_1007_s11277_021_08581_2
crossref_primary_10_1007_s11042_025_20843_w
crossref_primary_10_1002_ett_4224
crossref_primary_10_1016_j_measen_2023_100729
Cites_doi 10.1109/TWC.2013.103113.130018
10.1109/COMST.2016.2553178
10.1007/s11277-018-5504-0
10.1007/s11277-017-5105-3
10.1007/s10586-017-1571-3
10.1016/j.procs.2016.03.088
10.1109/T-WC.2008.071349
10.1016/j.sse.2008.12.011
10.1186/s13638-017-1018-9
10.4236/wsn.2012.44017
10.14419/ijet.v7i1.7.9385
10.1007/s10586-018-2384-8
10.1109/TVT.2014.2358624
10.1109/TIFS.2015.2500178
10.1007/s40998-018-0073-5
10.1109/TAC.2007.894520
10.1007/s10586-017-1092-0
10.1109/JSAC.2008.080104
10.1109/25.350282
10.1109/SURV.2011.122211.00162
10.1016/j.comnet.2012.02.014
10.1109/GLOCOM.2013.6831569
10.1109/SECON.2016.7506695
10.1109/WCNC.2011.5779157
10.1155/2016/2678269
10.1109/WIVEC.2014.6953223
10.1109/ICIS.2011.18
ContentType Journal Article
Copyright The Natural Computing Applications Forum 2018
Neural Computing and Applications is a copyright of Springer, (2018). All Rights Reserved.
Copyright_xml – notice: The Natural Computing Applications Forum 2018
– notice: Neural Computing and Applications is a copyright of Springer, (2018). All Rights Reserved.
DBID AAYXX
CITATION
8FE
8FG
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOI 10.1007/s00521-018-3788-3
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Health Research Premium Collection
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central
SciTech Premium Collection
ProQuest advanced technologies & aerospace journals
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Advanced Technologies & Aerospace Collection
Database_xml – sequence: 1
  dbid: P5Z
  name: ProQuest advanced technologies & aerospace journals
  url: https://search.proquest.com/hightechjournals
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1433-3058
EndPage 161
ExternalDocumentID 10_1007_s00521_018_3788_3
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29N
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
53G
5QI
5VS
67Z
6NX
8FE
8FG
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABLJU
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACUHS
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
B0M
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EAD
EAP
EBLON
EBS
ECS
EDO
EIOEI
EJD
EMI
EMK
EPL
ESBYG
EST
ESX
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAS
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P2P
P62
P9O
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7S
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8P
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~8M
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c316t-f6f4a9be56e926f26de558f5e3c2a4c12a982bfb6e4a8d2deff0efddf2b7f03c3
IEDL.DBID P5Z
ISICitedReferencesCount 38
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000511864500016&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0941-0643
IngestDate Tue Nov 04 23:08:54 EST 2025
Tue Nov 18 22:13:21 EST 2025
Sat Nov 29 02:59:10 EST 2025
Fri Feb 21 02:35:50 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Wireless communication
Éclat algorithm
Cognitive radio networks
Byzantine attack
Machine learning
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-f6f4a9be56e926f26de558f5e3c2a4c12a982bfb6e4a8d2deff0efddf2b7f03c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1467-1206
PQID 2344171242
PQPubID 2043988
PageCount 11
ParticipantIDs proquest_journals_2344171242
crossref_primary_10_1007_s00521_018_3788_3
crossref_citationtrail_10_1007_s00521_018_3788_3
springer_journals_10_1007_s00521_018_3788_3
PublicationCentury 2000
PublicationDate 20200100
2020-1-00
20200101
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – month: 1
  year: 2020
  text: 20200100
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
– name: Heidelberg
PublicationTitle Neural computing & applications
PublicationTitleAbbrev Neural Comput & Applic
PublicationYear 2020
Publisher Springer London
Springer Nature B.V
Publisher_xml – name: Springer London
– name: Springer Nature B.V
References Cichoń, Kliks, Bogucka (CR3) 2016; 18
Chen, Park, H. Reed (CR29) 2008; 26
CR19
Suresh, Reyana, Varatharajan (CR10) 2018
Cao, Guo (CR25) 2007; 52
CR15
Kannan, Sivasubramanian, Kaliappan, Vimal, Suresh (CR35) 2018
CR14
CR12
CR11
CR33
Park, Hong (CR6) 2013; 12
Vimal (CR27) 2016; 3
Zhao, Krishnamachari, Liu (CR1) 2008; 7
Fragkiadakis, Tragos, Askoxylakis (CR28) 2013; 15
Wang, Moayeri (CR4) 1995; 44
Sen (CR20) 2013; 1
CR2
Tang, Juebo (CR17) 2012; 4
Chaudhary, Dongre, Patil (CR16) 2016; 79
Madbushi, Raut, Rukmini (CR30) 2018; 42
CR5
CR8
Vimal, Kalaivani, Kaliappan (CR9) 2017
Thylashri, Femi, David, Suresh (CR32) 2018; 7
CR23
CR21
Vullers, van Schaijk, Doms, van Hoof, Mertens (CR18) 2009; 53
Howa, Maa, Qin (CR34) 2012; 56
Subbulakshmi (CR13) 2017
Ilango (CR22) 2018
Wu, Wang, Yin (CR24) 2018
Xu, He, Yang, Zhou, Cai (CR26) 2016; 11
Elkashlan, Wang, Duong, Karagiannidis, Nallanathan (CR7) 2015; 64
Bertsekas (CR31) 2007
Long Tang (3788_CR17) 2012; 4
3788_CR12
X Xu (3788_CR26) 2016; 11
3788_CR11
A Chaudhary (3788_CR16) 2016; 79
3788_CR33
3788_CR14
J Sen (3788_CR20) 2013; 1
3788_CR15
P Subbulakshmi (3788_CR13) 2017
N Kannan (3788_CR35) 2018
XR Cao (3788_CR25) 2007; 52
S Vimal (3788_CR9) 2017
S Vimal (3788_CR27) 2016; 3
A Fragkiadakis (3788_CR28) 2013; 15
KC Howa (3788_CR34) 2012; 56
Q Zhao (3788_CR1) 2008; 7
C Wu (3788_CR24) 2018
DP Bertsekas (3788_CR31) 2007
HS Wang (3788_CR4) 1995; 44
M Elkashlan (3788_CR7) 2015; 64
3788_CR19
S Ilango (3788_CR22) 2018
3788_CR21
Annamalai Suresh (3788_CR10) 2018
3788_CR23
K Cichoń (3788_CR3) 2016; 18
S Park (3788_CR6) 2013; 12
3788_CR5
S Madbushi (3788_CR30) 2018; 42
3788_CR2
3788_CR8
S Thylashri (3788_CR32) 2018; 7
RJM Vullers (3788_CR18) 2009; 53
Ruiliang Chen (3788_CR29) 2008; 26
References_xml – volume: 12
  start-page: 6166
  issue: 12
  year: 2013
  end-page: 6179
  ident: CR6
  article-title: Optimal spectrum access for energy harvesting cognitive radio networks
  publication-title: IEEE Trans Wirel Commun
  doi: 10.1109/TWC.2013.103113.130018
– volume: 18
  start-page: 1861
  issue: 3
  year: 2016
  end-page: 1886
  ident: CR3
  article-title: Energy-efficient cooperative spectrum sensing: a survey
  publication-title: IEEE Commun Surveys Tutor
  doi: 10.1109/COMST.2016.2553178
– year: 2018
  ident: CR10
  article-title: CEMulti-core architecture for optimization of energy over heterogeneous environment with high performance smart sensor devices
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-018-5504-0
– ident: CR14
– ident: CR2
– ident: CR12
– year: 2017
  ident: CR13
  article-title: Honest auction based radio network
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-017-5105-3
– volume: 3
  start-page: 35
  issue: 12
  year: 2016
  end-page: 42
  ident: CR27
  article-title: Secure data packet transmission in MANET using enhanced identity-based cryptography
  publication-title: Int J New Technol Sci Eng
– ident: CR33
– year: 2018
  ident: CR22
  article-title: Optimization using artificial bee colony based clustering approach for big data
  publication-title: Clust Comput.
  doi: 10.1007/s10586-017-1571-3
– ident: CR8
– volume: 79
  start-page: 683
  year: 2016
  end-page: 691
  ident: CR16
  article-title: Energy-decisive and upgrade cooperative spectrum sensing in cognitive radio networks
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2016.03.088
– ident: CR23
– volume: 7
  start-page: 5431
  issue: 12
  year: 2008
  end-page: 5440
  ident: CR1
  article-title: On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance
  publication-title: IEEE Trans Wirel Commun
  doi: 10.1109/T-WC.2008.071349
– volume: 53
  start-page: 684
  issue: 7
  year: 2009
  end-page: 693
  ident: CR18
  article-title: Micropower energy harvesting
  publication-title: Solid-State Electron
  doi: 10.1016/j.sse.2008.12.011
– ident: CR21
– ident: CR19
– year: 2018
  ident: CR24
  article-title: Energy-efficiency opportunistic spectrum allocation in cognitive wireless sensor network
  publication-title: EURASIP J Wirel Commun Netw.
  doi: 10.1186/s13638-017-1018-9
– volume: 4
  start-page: 120
  year: 2012
  end-page: 126
  ident: CR17
  article-title: Research and analysis on cognitive radio network security
  publication-title: Wirel Sensor Netw
  doi: 10.4236/wsn.2012.44017
– ident: CR15
– volume: 7
  start-page: 43
  issue: 1.7
  year: 2018
  end-page: 46
  ident: CR32
  article-title: Vitality and peripatetic sustain cluster key management schemes in MANET
  publication-title: Int J Eng Technol
  doi: 10.14419/ijet.v7i1.7.9385
– year: 2018
  ident: CR35
  article-title: Predictive big data analytic on demonetization data using support vector machine
  publication-title: Clust Comput.
  doi: 10.1007/s10586-018-2384-8
– volume: 64
  start-page: 3790
  issue: 8
  year: 2015
  end-page: 3795
  ident: CR7
  article-title: On the security of cognitive radio networks
  publication-title: IEEE Trans Veh Technol
  doi: 10.1109/TVT.2014.2358624
– volume: 11
  start-page: 373
  issue: 2
  year: 2016
  end-page: 387
  ident: CR26
  article-title: Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2015.2500178
– ident: CR11
– year: 2007
  ident: CR31
  publication-title: Dynamic programming and optimal control
– volume: 42
  start-page: 291
  year: 2018
  ident: CR30
  article-title: Trust establishment in chaotic cognitive environment to improve attack detection accuracy under primary user emulation
  publication-title: Iran J Sci Technol Trans Electr Eng
  doi: 10.1007/s40998-018-0073-5
– volume: 52
  start-page: 677
  issue: 4
  year: 2007
  end-page: 681
  ident: CR25
  article-title: Partially observable Markov decision processes with reward information: basic ideas and models
  publication-title: IEEE Trans Autom Control
  doi: 10.1109/TAC.2007.894520
– year: 2017
  ident: CR9
  article-title: Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks
  publication-title: Clust Comput
  doi: 10.1007/s10586-017-1092-0
– volume: 1
  start-page: 1
  year: 2013
  end-page: 43
  ident: CR20
  article-title: A survey on security and privacy protocols for cognitive wireless sensor networks
  publication-title: J Netw Inf Secur
– volume: 26
  start-page: 25
  issue: 1
  year: 2008
  end-page: 37
  ident: CR29
  article-title: Defense against Primary User Emulation Attacks in Cognitive Radio Networks
  publication-title: IEEE Journal on Selected Areas in Communications
  doi: 10.1109/JSAC.2008.080104
– volume: 44
  start-page: 163
  issue: 1
  year: 1995
  end-page: 171
  ident: CR4
  article-title: Finite-state Markov channel: a useful model for radio communication channels
  publication-title: IEEE Trans Veh Technol
  doi: 10.1109/25.350282
– ident: CR5
– volume: 15
  start-page: 428
  issue: 1
  year: 2013
  end-page: 445
  ident: CR28
  article-title: A survey on security threats and detection techniques in cognitive radio networks
  publication-title: Commun Surv Tutor IEEE
  doi: 10.1109/SURV.2011.122211.00162
– volume: 56
  start-page: 2068
  issue: 7
  year: 2012
  end-page: 2079
  ident: CR34
  article-title: An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2012.02.014
– year: 2017
  ident: 3788_CR13
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-017-5105-3
– volume: 4
  start-page: 120
  year: 2012
  ident: 3788_CR17
  publication-title: Wirel Sensor Netw
  doi: 10.4236/wsn.2012.44017
– ident: 3788_CR23
– volume: 1
  start-page: 1
  year: 2013
  ident: 3788_CR20
  publication-title: J Netw Inf Secur
– year: 2017
  ident: 3788_CR9
  publication-title: Clust Comput
  doi: 10.1007/s10586-017-1092-0
– ident: 3788_CR21
– ident: 3788_CR5
  doi: 10.1109/GLOCOM.2013.6831569
– volume: 64
  start-page: 3790
  issue: 8
  year: 2015
  ident: 3788_CR7
  publication-title: IEEE Trans Veh Technol
  doi: 10.1109/TVT.2014.2358624
– ident: 3788_CR11
  doi: 10.1109/SECON.2016.7506695
– ident: 3788_CR14
  doi: 10.1109/WCNC.2011.5779157
– year: 2018
  ident: 3788_CR22
  publication-title: Clust Comput.
  doi: 10.1007/s10586-017-1571-3
– volume-title: Dynamic programming and optimal control
  year: 2007
  ident: 3788_CR31
– year: 2018
  ident: 3788_CR24
  publication-title: EURASIP J Wirel Commun Netw.
  doi: 10.1186/s13638-017-1018-9
– volume: 42
  start-page: 291
  year: 2018
  ident: 3788_CR30
  publication-title: Iran J Sci Technol Trans Electr Eng
  doi: 10.1007/s40998-018-0073-5
– volume: 53
  start-page: 684
  issue: 7
  year: 2009
  ident: 3788_CR18
  publication-title: Solid-State Electron
  doi: 10.1016/j.sse.2008.12.011
– volume: 52
  start-page: 677
  issue: 4
  year: 2007
  ident: 3788_CR25
  publication-title: IEEE Trans Autom Control
  doi: 10.1109/TAC.2007.894520
– volume: 7
  start-page: 5431
  issue: 12
  year: 2008
  ident: 3788_CR1
  publication-title: IEEE Trans Wirel Commun
  doi: 10.1109/T-WC.2008.071349
– volume: 79
  start-page: 683
  year: 2016
  ident: 3788_CR16
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2016.03.088
– ident: 3788_CR12
  doi: 10.1155/2016/2678269
– volume: 15
  start-page: 428
  issue: 1
  year: 2013
  ident: 3788_CR28
  publication-title: Commun Surv Tutor IEEE
  doi: 10.1109/SURV.2011.122211.00162
– ident: 3788_CR33
  doi: 10.1109/WIVEC.2014.6953223
– ident: 3788_CR8
– volume: 3
  start-page: 35
  issue: 12
  year: 2016
  ident: 3788_CR27
  publication-title: Int J New Technol Sci Eng
– volume: 7
  start-page: 43
  issue: 1.7
  year: 2018
  ident: 3788_CR32
  publication-title: Int J Eng Technol
  doi: 10.14419/ijet.v7i1.7.9385
– volume: 11
  start-page: 373
  issue: 2
  year: 2016
  ident: 3788_CR26
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2015.2500178
– volume: 18
  start-page: 1861
  issue: 3
  year: 2016
  ident: 3788_CR3
  publication-title: IEEE Commun Surveys Tutor
  doi: 10.1109/COMST.2016.2553178
– volume: 44
  start-page: 163
  issue: 1
  year: 1995
  ident: 3788_CR4
  publication-title: IEEE Trans Veh Technol
  doi: 10.1109/25.350282
– year: 2018
  ident: 3788_CR10
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-018-5504-0
– volume: 26
  start-page: 25
  issue: 1
  year: 2008
  ident: 3788_CR29
  publication-title: IEEE Journal on Selected Areas in Communications
  doi: 10.1109/JSAC.2008.080104
– volume: 12
  start-page: 6166
  issue: 12
  year: 2013
  ident: 3788_CR6
  publication-title: IEEE Trans Wirel Commun
  doi: 10.1109/TWC.2013.103113.130018
– year: 2018
  ident: 3788_CR35
  publication-title: Clust Comput.
  doi: 10.1007/s10586-018-2384-8
– ident: 3788_CR15
– ident: 3788_CR2
  doi: 10.1109/ICIS.2011.18
– ident: 3788_CR19
– volume: 56
  start-page: 2068
  issue: 7
  year: 2012
  ident: 3788_CR34
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2012.02.014
SSID ssj0004685
Score 2.4040895
Snippet The cognitive radio network (CR) is a primary and promising technology to distribute the spectrum assignment to an unlicensed user (secondary users) which is...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 151
SubjectTerms Algorithms
Artificial Intelligence
Brain- Inspired computing and Machine learning for Brain Health
Cognitive radio
Computational Biology/Bioinformatics
Computational Science and Engineering
Computer Science
Computer simulation
Data communications
Data Mining and Knowledge Discovery
Data transmission
Encryption
Energy
Energy consumption
Energy levels
Image Processing and Computer Vision
Machine learning
Markov chains
Markov processes
Monitoring
Network security
Optimization
Probability and Statistics in Computer Science
Radio networks
Security
SummonAdditionalLinks – databaseName: SpringerLINK Contemporary 1997-Present
  dbid: RSV
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6-Dl58i-uLOXhSAm3SZtujiIsHWcTH4q20TbIU1la2q-Av8m86k23XByroudO0MJOZyeSb-Rg7kl2DUVApjsFI8wADEs8snlJCX0deFodp7oZVDy67_X50fx9fNX3cdYt2b68knaeeNbtRBZOOvhGnGehczrNF_EBEfA3XN4MPzZCOhxOPLQTpCWR7lfndEp-D0XuG-eVS1MWa3uq__nKNrTSpJZxObWGdzZlyg622tA3Q7OJN9voBKASVhZpK7kYDgUVhQrELdU9FNCBQ_BAeHN7SQEMwMeQU-VC8QI-DKTcnenp4JBNMR6MXqDIq9KIAtQFVz-C4diAtNRjXZwgVeqmHpv0TihJmCCYYp7qooJwi0-stdtc7vz274A1fA8-lrybcKhukcWZCZWKhrFDahGFkQyNzkQa5L9I4EpnNlAnSSAttrPWM1dqKrGs9mctttlBWpdlhYNDtxSYIRB5kuKaKQ0xDMFMLdexb5dsO81rFJXkzzJw4NUbJbAyzU0SCikhIEYnssOPZK4_TSR6_Ce-31pA0m7pOhCS-NkyIRIedtNp_f_zjYrt_kt5jy4LO9K7Ms88WJuMnc8CW8udJUY8Pna2_Adoc_RM
  priority: 102
  providerName: Springer Nature
Title Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks
URI https://link.springer.com/article/10.1007/s00521-018-3788-3
https://www.proquest.com/docview/2344171242
Volume 32
WOSCitedRecordID wos000511864500016&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ProQuest advanced technologies & aerospace journals
  customDbUrl:
  eissn: 1433-3058
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0004685
  issn: 0941-0643
  databaseCode: P5Z
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1433-3058
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0004685
  issn: 0941-0643
  databaseCode: BENPR
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1433-3058
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004685
  issn: 0941-0643
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwELag5cClLQXE9qU5cAJZJHbsTU4VVK04oNWq0KriEiV-VCttk2WzrdRfxN9kxuvslkr0wiWXOFakGc83M56Zj7H3cugQBbXmCEaWZwhIvPYYpajU5kldqMqEYdWX34ajUX51VYxjwq2LZZW9TQyG2raGcuSfhCSyLEQjcTz7xYk1im5XI4XGc7ZJUxKIumGsfj7oiwyUnBjBUHVPJvtbzSQMEUXgwkA65zRRncu_cWntbD66Hw2wc7b9vz-8w7aiwwmflxryij1zzS7b7skcIJ7t1-z3g_IhaD10lIh3FqiEFBaEaKgRlFoDKpW_hptQhekg0k5cc8JDXD5BO4SOOCfSepiRYlbT6T20NaV_cQE1B7V3EBh4oGosuNB9CC3arpvYFAqTBlZ1TTCv7KSFZlmv3r1hF2enP06-8sjiwI1M9YJ77bOqqJ3SrhDaC22dUrlXThpRZSYVVZGL2tfaZVVuhXXeJ85b60U99Ik08i3baNrGvWPg0BgWLsuEyWrcUxcKnRP035QtUq9TP2BJL8PSxBHnxLQxLVfDmYPYSxR7SWIv5YB9WH0yW873eGrxQS_qMh71rlzLecA-9sqyfv3Pzfae3myfvRQU2odszwHbWMxv3SF7Ye4Wk25-xDa_nI7G50dB3_F5_v3yD5QhClo
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VgkQvLZ9iS4E5wAVkkTiJNzkghICqVZdVDwVVXEIS21Wk3WS7SVv1F3HjNzLjTXYLEr31wDmOD8mbeZ7xzDyAl8HQEAsqJYiMtAiJkERuKUqJfB17eRJlhRtW_W00HI_j4-PkcA1-9b0wXFbZ-0TnqHVdcI78rQxYLIvYSL6fnQpWjeLb1V5CYwGLA3N5QSFb827_E_3fV1Lufj76uCc6VQFRBL5qhVU2zJLcRMokUlmptImi2EYmKGQWFr7MkljmNlcmzGIttbHWM1ZrK_Oh9YIioH1vwe0wlB5b0WH0_UofppMApYiJq4nCoL9F9dzQUiJKCtxjwRPcRfAnD64Ot3_dxzqa29363z7QPdjsDtT4YWEB92HNVA9gqxerwM53PYSfV8qjsLbY8EWD0cglstgyYxPiOXWI3ApwglNXZWqwk9U4Ecz3tLwkP0uBhmjLqcEZG142mVxinXN6mxZw81N9jk5hCLNKo3HdlViTb552Ta9YVris28J5pssaq0U9fvMIvt7I53oM61VdmSeAhpx9YghZRZjTniqJ6PBF59NIJ75Vvh2A12MmLboR7qwkMkmXw6cdzFKCWcowS4MBvF6-MlvML7lu8U4PrbRzZU26wtUA3vTgXD3-52bb12_2Au7uHX0ZpaP98cFT2JCcxnCZrR1Yb-dn5hncKc7bspk_dzaG8OOmMfsbjndpgQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS9xAEB-sluKL2g_xrLXz0KeWxcvuZi95LG2PinIIbcW3kGR35eBMjksU_Iv8N53ZS05b2kLpcybLwszufOxv5gfwTo0ceUFjBDkjKzQ5JFF4ylLiyCbDIo3zMgyrPj8dTSbJxUV61vGcNj3avX-SXPY08JSmqj2aW3-0anzjaianwYngeehCPYENzTh6Tte_nT9qjAycnJTCMLxHq_5Z83dL_OyYHqLNXx5Ig98Zb__3jndgqws58ePSRp7DmqtewHZP54Dd6X4Jd48ARFh7bLgU7ywyiBRb9mlkE1xcQwbLX-JVwGE67IgnLgV7RBKf0k1Eobhg2nqcs2nms9kt1gUXgEmA24PqGwwcPJhXFl3oP8Sabq-rri0UpxWukE24yO20xmqJWG9ewY_xl--fvoqOx0GUKjKt8MbrPC1cbFwqjZfGujhOfOxUKXNdRjJPE1n4wjidJ1Za5_3QeWu9LEZ-qEq1C-tVXbk9QEfXYeq0lqUuaE2TxhSeUAQX2zTyJvIDGPZKzMpuyDlzbcyy1XjmoIiMFJGxIjI1gPerX-bLCR9_Ez7oLSPrDnuTScU8bhQoyQF86C3h4fMfF9v_J-m38Ozs8zg7PZ6cvIZNyWl_qAQdwHq7uHZv4Gl5006bxWE4AvfgQAjq
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Development+of+secured+data+transmission+using+machine+learning-based+discrete-time+partially+observed+Markov+model+and+energy+optimization+in+cognitive+radio+networks&rft.jtitle=Neural+computing+%26+applications&rft.au=Vimal%2C+S.&rft.au=Kalaivani%2C+L.&rft.au=Kaliappan%2C+M.&rft.au=Suresh%2C+A.&rft.date=2020-01-01&rft.issn=0941-0643&rft.eissn=1433-3058&rft.volume=32&rft.issue=1&rft.spage=151&rft.epage=161&rft_id=info:doi/10.1007%2Fs00521-018-3788-3&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s00521_018_3788_3
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0941-0643&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0941-0643&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0941-0643&client=summon