2014
DOI: 10.1109/tmc.2013.26
|View full text |Cite
|
Sign up to set email alerts
|

ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…In order to reconstructed the receive signal from receiver antennas, the sampling rate should be greater than or equal to the Nyquist rate , one of two bits [19,27] . Thus, the bit-extraction rate should reach 6 10 bit/s theoretically. The strong extractor uses an SHA-256 algorithm to generate the final key based on channel response characteristics from the quantized amplitude values and quantized phase values, respectively.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In order to reconstructed the receive signal from receiver antennas, the sampling rate should be greater than or equal to the Nyquist rate , one of two bits [19,27] . Thus, the bit-extraction rate should reach 6 10 bit/s theoretically. The strong extractor uses an SHA-256 algorithm to generate the final key based on channel response characteristics from the quantized amplitude values and quantized phase values, respectively.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…Another typical type of attack is the Spectrum Sensing Data Falsification (SSDF) attacks, in which the malicious attackers send a modified spectrum sensing result to the central combiner in a multi-node collaborative spectrum sensing strategy. Researchers have intensively studied both PUE attacks and SSDF attacks in the past few years [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…Chen et al [18] applied Modified Grubbs test and employed Conjugate Prior-based theory to detect the malicious users based on the soft fusion scheme, in which the sensing reports is taken as a stochastic process. By investigating the malicious node's manipulation of sensing result independently or collaboratively, Hyder et al [19] proposed an adaptive reputation-based clustering mechanism, which requires no prior knowledge of distribution of attacking nodes and is applicable for a wide range of attacking scenarios. Focusing on the massive attacks, Sharifi et al [20] made use of Weighted Likelihood Ratio Test to estimate the credit value of each SU.…”
Section: Related Workmentioning
confidence: 99%
“…Over the course of the past decades, many efforts have been made to evaluate, recognize, predict, and prevent attacks or frauds in reputation systems [8][9][10]. There are three main kinds of techniques for detecting fraud in reputation aggregation: majority rule [11], signal modeling, and trust management [12].…”
Section: Introductionmentioning
confidence: 99%