2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2021
DOI: 10.1109/vtc2021-fall52928.2021.9625254
|View full text |Cite
|
Sign up to set email alerts
|

Exploitation Analysis of Byzantine attack for Cooperative Spectrum Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Therefore, the joint spectrum sensing and resource allocation scheme is proposed in this paper, which can be split into two subalgorithms are the selection-majority and spectrum resource allocation (SRA) algorithm. Following our previous work, 35,36 in addition to enriching and improving the system model and the exploitation of Byzantine attack, this paper also extends to spectrum resource allocation. Specifically, the main contribution of this paper can be summarized as follows.…”
Section: Our Contributionsmentioning
confidence: 97%
“…Therefore, the joint spectrum sensing and resource allocation scheme is proposed in this paper, which can be split into two subalgorithms are the selection-majority and spectrum resource allocation (SRA) algorithm. Following our previous work, 35,36 in addition to enriching and improving the system model and the exploitation of Byzantine attack, this paper also extends to spectrum resource allocation. Specifically, the main contribution of this paper can be summarized as follows.…”
Section: Our Contributionsmentioning
confidence: 97%
“…Feng et al proposed a flexible intermittent SSDF (ISSDF) attack and corresponding countermeasures in References 16,17, but only focused on the static attack and ignored the change of the attack probability. By using Bayesian risk maximization and analyzing the sensing results, in References 18–21, by suspiciousness judgment and by the attacker's attack parameter identification respectively, which improves the stability of detection of MU. But they didn't completely solve the problem of large‐scale attacks.…”
Section: Motivation and Contributionmentioning
confidence: 99%