2020
DOI: 10.1109/lcomm.2020.2990869
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Byzantine Attack Strategy for Cooperative Spectrum Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 38 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…A number of research works can be found on the above concept. It has been used for cluster based reputation formulation to detect intrusion attacks in [123], generalized Byzantine attack and defence in [124,125] for the analysis of attack strategies in the absence of defence and implementing suitable defence strategy in [126], for the removal of anomalous values from the data fusion process in [127], for the removal of malicious data in heterogeneous and ultra-dense networks in [128], for implementing a Bayesian inference based sliding-window trust mechanism in [129] analysing a cost benefit trade-off in Byzantine attacks in CSS in [130] and detecting MUs in non-orthogonal multiple access based systems in [131].…”
Section: Reputation Based Mechanismsmentioning
confidence: 99%
“…A number of research works can be found on the above concept. It has been used for cluster based reputation formulation to detect intrusion attacks in [123], generalized Byzantine attack and defence in [124,125] for the analysis of attack strategies in the absence of defence and implementing suitable defence strategy in [126], for the removal of anomalous values from the data fusion process in [127], for the removal of malicious data in heterogeneous and ultra-dense networks in [128], for implementing a Bayesian inference based sliding-window trust mechanism in [129] analysing a cost benefit trade-off in Byzantine attacks in CSS in [130] and detecting MUs in non-orthogonal multiple access based systems in [131].…”
Section: Reputation Based Mechanismsmentioning
confidence: 99%
“…is the additive white Gaussian noise of the i th IoT device, and Z i [k] and S[k] are independent of each other.h i is the channel gain of the communication between the i th IoT device and the PU. H 0 is the current frequency band is free, and H 1 is the current frequency band is occupied [41].…”
Section: Spectrum-aware Modelmentioning
confidence: 99%
“…A generalised attack model was used to compute the attack cost and benefit, and cost‐benefit trade‐off issues. A generalised soft Byzantine attack model was developed in [33] to examine attack strategies in the absence of any defence, in terms of the attack strength and probability. A classical trust‐value‐based CSS algorithm was used to carried attack strategies and estimate the security of Byzantine attacker.…”
Section: Related Workmentioning
confidence: 99%