2019
DOI: 10.3390/electronics8111299
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Framework to Detect Malicious Nodes in Cognitive Radio Networks

Abstract: Cognitive radio is considered as a pioneering technique in the domain of wireless communication as it enables and permits the Cognitive Users (CU) to exploit the unused channels of the Primary Users (PU) for communication and networking. The CU nodes access the vacant bands/channels through the Cognitive Radio Network (CRN) cycle by executing its different phases, which are comprised of sensing, decision making, sharing (accessing) and hand-off (mobility). Among these phases, hand-off is the most critical phas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 42 publications
0
9
0
Order By: Relevance
“…Briefly put, traditional optimization techniques are unsuitable for CR-IoT applications due to the lack of a complete environment model [19], the fact that they are not scalable to support massive IoT connectivity [20,21], and the fact that they are unable to adapt to the changing and dynamic environments [21]. Many different intelligent MU detections have been developed by researchers for empowering user security such as FoF [22], TTA [23], and so on that are discovered with high accuracy.…”
Section: Optimization and Heuristic Approachesmentioning
confidence: 99%
“…Briefly put, traditional optimization techniques are unsuitable for CR-IoT applications due to the lack of a complete environment model [19], the fact that they are not scalable to support massive IoT connectivity [20,21], and the fact that they are unable to adapt to the changing and dynamic environments [21]. Many different intelligent MU detections have been developed by researchers for empowering user security such as FoF [22], TTA [23], and so on that are discovered with high accuracy.…”
Section: Optimization and Heuristic Approachesmentioning
confidence: 99%
“…A heavier shadowing severity of the satellite interference link results is used to minimise the outage probability. A secure and trusted routing and handoff mechanism were introduced in [36] to improve the network delay and overhead. However, the inter‐domain handoff communication was not considered.…”
Section: Related Workmentioning
confidence: 99%
“…A trust analyser (TA) is proposed between the CR nodes. The TA handles the table of entire transmitting nodes while computing the trust value through the social impact theory optimizer [9].…”
Section: Introductionmentioning
confidence: 99%