2017
DOI: 10.1007/s11277-017-4621-5
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 27 publications
0
16
0
Order By: Relevance
“…Authors in [18], [19], proposed a mathematical model based on trust and reputation factor. Kar et al in [20], used four parameters in their work in order to calculate the trustworthiness (sensing reputation). These factors were active factor, consistency factor, incentive factor and trust factor.…”
Section: Related Workmentioning
confidence: 99%
“…Authors in [18], [19], proposed a mathematical model based on trust and reputation factor. Kar et al in [20], used four parameters in their work in order to calculate the trustworthiness (sensing reputation). These factors were active factor, consistency factor, incentive factor and trust factor.…”
Section: Related Workmentioning
confidence: 99%
“…In [7], the authors considered the construction of trust mechanism from the perspective of the access competition related to vacant PU spectrum bands. In [8], the authors proposed a trust management scheme by considering multiple decision factors (hereinafter "MFTM"), including (a) history-based trust factor, the trust level of an SU during the period of spectrum sensing, (b) active factor, the level of activity of an SU in the process of spectrum sensing, (c) incentive factor, a reward or incentive for the honest SUs, also serving as a punishment with decrease in trust level for the attackers, and (d) consistency factor, the constancy of maintaining a good trust level. The commonality of these existing typical trust schemes is that the trust value of an SU can be calculated by his previous sensing behaviors and the sensing data of malicious SUs should be deleted when making a final decision.…”
Section: Trust Mechanismmentioning
confidence: 99%
“…That is, such two kinds of SSDF attack patterns are launched in the static and individual way. This original SSDF attack patterns [4] can be easily detected by current trust mechanism such as [5][6][7][8], since the original SSDF attackers will get a lower trust value when they always submit false sensing data individually.…”
Section: Dc-ssdf Attack Overviewmentioning
confidence: 99%
See 2 more Smart Citations