2016
DOI: 10.1109/tvt.2016.2520983
|View full text |Cite
|
Sign up to set email alerts
|

Joint Spectrum Sensing and Resource Allocation Scheme in Cognitive Radio Networks with Spectrum Sensing Data Falsification Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 63 publications
(32 citation statements)
references
References 19 publications
0
32
0
Order By: Relevance
“…Since the neighbors of SUs may suffer from shadow fading and malicious users may exist as shown in Fig. 5 [33] , the fusion of the perception results of all neighbors is often not the best result. In addition, the communication overhead caused by the interaction perception results is also a problem to be considered.…”
Section: Cooperative Spectrum Sensingmentioning
confidence: 99%
“…Since the neighbors of SUs may suffer from shadow fading and malicious users may exist as shown in Fig. 5 [33] , the fusion of the perception results of all neighbors is often not the best result. In addition, the communication overhead caused by the interaction perception results is also a problem to be considered.…”
Section: Cooperative Spectrum Sensingmentioning
confidence: 99%
“…In [19], a sharing-based resource-allocation algorithm is proposed to design optimal sensing time, bandwidth allocation and power allocation. Chen et al propose a weighted-proportionalfairness-based joint spectrum sensing and resource allocation scheme in cognitive radio networks in [20]. When different spectrum bands are available, spectrum refarming is also an innovative spectrum sharing technique which supports different generations of cellular networks to operate in the same radio spectrum.…”
Section: A Related Workmentioning
confidence: 99%
“…In [14]- [19], trust models have been applied to channel sensing and channel access in CRNs to detect malicious nodes in order to improve sensing outcomes with reduce missed detection and false alarm rates. In [20], a reputation scheme has been applied to a clusterhead to detect its malicious member nodes in order to provide higher security to the non-manipulability and the agreement property of clusterhead election results, and consequently it maintains the network performance with the increase of member nodes.…”
Section: B Related Workmentioning
confidence: 99%