2020
DOI: 10.23919/jsee.2020.000002
|View full text |Cite
|
Sign up to set email alerts
|

An algorithm based on evidence theory and fuzzy entropy to defend against SSDF

Abstract: In cognitive radio networks, spectrum sensing is one of the most important functions to identify available spectrum for improving the spectrum utilization. Due to the open characteristic of the wireless electromagnetic environment, the wireless network is vulnerable to be attacked by malicious users (MUs), and spectrum sensing data falsification (SSDF) attack is one of the most harmful attacks on spectrum sensing performance. In this article, an algorithm based on the evidence theory and fuzzy entropy is propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…According to the distance of evidence and the classical conflict coefficient, the new conflict coefficient is calculated, and the conflict weight of evidence is obtained. The fuzzy weight is calculated by fuzzy entropy, and the weight of credibility is obtained by updating credibility [35]. Our scheme also uses a weighted fusion approach, the difference is that we use Hidden Markov Model to determine the weight of nodes.…”
Section: Related Workmentioning
confidence: 99%
“…According to the distance of evidence and the classical conflict coefficient, the new conflict coefficient is calculated, and the conflict weight of evidence is obtained. The fuzzy weight is calculated by fuzzy entropy, and the weight of credibility is obtained by updating credibility [35]. Our scheme also uses a weighted fusion approach, the difference is that we use Hidden Markov Model to determine the weight of nodes.…”
Section: Related Workmentioning
confidence: 99%
“…en, associations between alerts were established using the knowledge base to generate what were known as superalerts. e method proposed by Liu has poor fusion accuracy in a complex network environment, with large resource consumption and low fusion efficiency [12]. Zheng et al used the Pignistic distance to measure the similarity between different pieces of evidence based on sampling past evidence using a sliding window [13].…”
Section: Related Workmentioning
confidence: 99%
“…As an indeterminate reasoning theory [24], evidence theory was first proposed by Dempster and later improved by Shafer [12]. Evidence theory is an extension of probability theory.…”
Section: Evidence Theorymentioning
confidence: 99%
See 2 more Smart Citations