2013
DOI: 10.1155/2013/261264
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Value-Based Spectrum Allocation Algorithm in CWSNs

Abstract: With the increase of congestible frequency spectrums and the rapid development of wireless sensor networks (WSNs) applications, the new technology-combing cogitative radio technology with WSNs-called CWSNs will bring broad prospects to the field of radio and sensor networks. CWSN devotes itself to the solution of spectrum sharing in forms of networks, such as IEEE 802.11 and Bluetooth. A new algorithm is proposed for allocating the idle spectrum to secondary users (SUs). This algorithm uses "the last diminishe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Very few papers focus on spectrum allocation or channel selection based on the trust concept. One of the first contributions in this direction is [25], where the authors propose a trust algorithm that combines the trust value and the method of spectrum allocation. During the spectrum allocation, the reputation value is fixed and cannot be changed.…”
Section: Trust Mechanisms In Wireless Networkmentioning
confidence: 99%
“…Very few papers focus on spectrum allocation or channel selection based on the trust concept. One of the first contributions in this direction is [25], where the authors propose a trust algorithm that combines the trust value and the method of spectrum allocation. During the spectrum allocation, the reputation value is fixed and cannot be changed.…”
Section: Trust Mechanisms In Wireless Networkmentioning
confidence: 99%
“…Indirect attacks help in preventing attacks for the long run focusing on future perspectives. A trust valuebased spectrum allocation methodology has been proposed in [19], in which the secondary users with fair trust value are only allowed to pair with unused Primary spectrum space and discards the SU pairing if the trust value is lower. In paper [20], the author has proposed a multiuser scheduling scheme, which safeguards the physical layer transmission in cognitive radio networks.…”
Section: Related Workmentioning
confidence: 99%