2019
DOI: 10.1109/tccn.2019.2913397
|View full text |Cite
|
Sign up to set email alerts
|

PROLEMus: A Proactive Learning-Based MAC Protocol Against PUEA and SSDF Attacks in Energy Constrained Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(31 citation statements)
references
References 20 publications
0
31
0
Order By: Relevance
“…This is because of identifying two hypotheses, first, by applying the STALOG function, and then measuring the false alarm and detection by means of Logical OR rule. With this, the SD is said to be reduced using OS‐LNCC method by 20% compared to [1], 52% compared to [2], 55% compared to [5] and 59% compared to [16].…”
Section: Methodsmentioning
confidence: 99%
“…This is because of identifying two hypotheses, first, by applying the STALOG function, and then measuring the false alarm and detection by means of Logical OR rule. With this, the SD is said to be reduced using OS‐LNCC method by 20% compared to [1], 52% compared to [2], 55% compared to [5] and 59% compared to [16].…”
Section: Methodsmentioning
confidence: 99%
“…Mishra et al implemented deep learning-based denoting by improving the deep network structure. In the literature [8], the authors used ResNet to remove rain noise from photographs and the experimental results showed that the model has superior denoting performance [9]. Gupta [8].…”
Section: Related Workmentioning
confidence: 99%
“…In previous works, 6,15 the authors propose a distributed trust‐based model for an efficient channel's leasing policy in which a Primary User (PU) willingly leases a portion of its channel access to unlicensed Secondary Users (SUs), and in return, these provide cooperative services by adding intentional jamming to counter eavesdropping and employ cooperative relaying to enhance the quality of communication. Nevertheless, the authors in previous studies 10,12,16,19,20 model the cooperative communication in a spectrum aware environment as a statistical framework and hence propose to employ the cooperative adversarial model for analyzing SSDF's consequences on DSA‐enabled CR‐IIoTs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In state‐of‐the‐art, 20,21 the researchers propose certain exclusive trust cum cryptographic frameworks to counter SSDF in a Cognitive Radio‐environment. The Theory of Uncertain Reasoning, and Privacy Preserving Public Key techniques are recently explored.…”
Section: Literature Reviewmentioning
confidence: 99%