2009 IEEE International Conference on Communications 2009
DOI: 10.1109/icc.2009.5198638
|View full text |Cite
|
Sign up to set email alerts
|

A New Cooperative Detection Technique with Malicious User Suppression

Abstract: Spectrum detection for vacant bands is one of the key techniques in cognitive radio (CR) systems. Cooperative detection outperforms single user detection in many aspects. The existence of malicious user could severely degrade the performance of cooperative CR systems. In this paper, a new cooperative detection scheme with malicious user suppression is proposed, which has lower complexity and better performance compared with the existing one. Simulation results show that when 25% users in the system are malicio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(42 citation statements)
references
References 9 publications
0
42
0
Order By: Relevance
“…It bases its functionality on the generation and transmission of specific keys to each node. As a third example of safety sensing investigation, the research [15] proposes a collaborative algorithm based on energy detection and weighted combining (similar to a reputation system) to prevent malicious users.…”
Section: Related Workmentioning
confidence: 99%
“…It bases its functionality on the generation and transmission of specific keys to each node. As a third example of safety sensing investigation, the research [15] proposes a collaborative algorithm based on energy detection and weighted combining (similar to a reputation system) to prevent malicious users.…”
Section: Related Workmentioning
confidence: 99%
“…When simple attack patterns are adopted by only a few malicious users (MUs) in CRNs, the schemes presented in [5][6][7] can work well enough. The concept of applying the trust and reputation model in CRNs has also attracted interest recently [8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…The schemes proposed in [5][6][7] become defective either by the increasing proportion of malicious users or in the face of complex attack strategies. Others in [8][9][10] have no ability to maintain robustness under the presence of a high proportion of MUs, while the rest of the methods, as in [11][12][13], cannot cope with complicated attack patterns.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations