IEEE INFOCOM 2014 - IEEE Conference on Computer Communications 2014
DOI: 10.1109/infocom.2014.6848195
|View full text |Cite
|
Sign up to set email alerts
|

Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing

Abstract: Abstract-In a cognitive radio network, selfish secondary users may not voluntarily contribute to desired cooperative sensing. We design the first fully distributed scheme to incentivize participation of nodes in cooperative sensing, by connecting sensing and spectrum allocation, and offering incentive from latter to the former. Secondary users that are more active and report more accurate sensing values will be given higher reputation values, which results in lower prices in the spectrum allocation phase. Theo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
16
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 26 publications
0
16
0
Order By: Relevance
“…To avoid the potential interference with the primary users, secondary users firstly sense whether the spectrum of interest is being used by the primary users. If the spectrum is unoccupied, the secondary users apply certain spectrum allocation scheme to decide which of them may access the available spectrum [3].…”
Section: Introductionmentioning
confidence: 99%
“…To avoid the potential interference with the primary users, secondary users firstly sense whether the spectrum of interest is being used by the primary users. If the spectrum is unoccupied, the secondary users apply certain spectrum allocation scheme to decide which of them may access the available spectrum [3].…”
Section: Introductionmentioning
confidence: 99%
“…For example, 48 an adversary may launch spectrum sensing data falsification 49 (SSDF) attacks, where the adversary corrupts a subset of 50 secondary users (SUs) as illustrated in the Fig. 1 to report 51 design [14], consensus algorithm [15], [18], outlier detection has been introduced into CPS to implement secure spectrum 77 sensing [9], [12], [16], [18]- [24]. 78 Although some reputation based CSS strategies have been 79 proposed in the literatures, most of them were based on the 80 trusted third party and traditional cryptographic encryption 81 and authentication techniques, thus ignoring internal attacks 82 launched by an inside attacker that has the legal identity and 83 dishonest recommendations used to frame up good parties 84 and/or boost trust values of malicious peers.…”
mentioning
confidence: 99%
“…Spectrum sensing in CRN 128 have been widely studied, using game theory [13], incentive 129 design [14], consensus algorithm [18] In this paper, we focus on the network environment of CRN 203 based CPS (CRN-CPS), which is a viable solution to imple-204 ment fast and large-scale CPS applications [2], [4]. The 205 typical CRN-CPS architecture is depicted in Fig.…”
mentioning
confidence: 99%
See 2 more Smart Citations