2016 8th International Symposium on Telecommunications (IST) 2016
DOI: 10.1109/istel.2016.7881781
|View full text |Cite
|
Sign up to set email alerts
|

Reputation-based Likelihood Ratio Test with anchor nodes assistance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…By investigating the malicious node's manipulation of sensing result independently or collaboratively, Hyder et al [19] proposed an adaptive reputation-based clustering mechanism, which requires no prior knowledge of distribution of attacking nodes and is applicable for a wide range of attacking scenarios. Focusing on the massive attacks, Sharifi et al [20] made use of Weighted Likelihood Ratio Test to estimate the credit value of each SU. Rawat et al [21] presented a reputation based strategy to identify SSDF attackers.…”
Section: Related Workmentioning
confidence: 99%
“…By investigating the malicious node's manipulation of sensing result independently or collaboratively, Hyder et al [19] proposed an adaptive reputation-based clustering mechanism, which requires no prior knowledge of distribution of attacking nodes and is applicable for a wide range of attacking scenarios. Focusing on the massive attacks, Sharifi et al [20] made use of Weighted Likelihood Ratio Test to estimate the credit value of each SU. Rawat et al [21] presented a reputation based strategy to identify SSDF attackers.…”
Section: Related Workmentioning
confidence: 99%
“…The authors utilise geographical and reputational weights to define a two-level FC for secure collaborative sensing. Sharifi et al presented a weighted likelihood ratio rest (WLRT) in [15] to mitigate the effect of Byzantine attack, in which the collaborative weight is calculated by comparing the sensing history of each user with the reliable anchor nodes' global decision. In another work, Usman and Insoo proposed a simple, but the efficient classification method in [16] that classifies the SUs into reliable, neutral and unreliable categories.…”
Section: Related Workmentioning
confidence: 99%
“…Before starting with the usability evaluation, the description and definition of the related parameters are provided. In (15) and 16,…”
Section: Usability Evaluationmentioning
confidence: 99%
“…During SSDF attacks, CR attackers send falsified spectrum sensing results to the FC and disrupt the global sensing decision. To overcome the impact of SSDF attacks, several different solutions have been proposed in previously [5][6][7]. In PUEA, a malicious attacker mimics some characteristics of the legitimate PU's signal.…”
Section: Introductionmentioning
confidence: 99%