2021
DOI: 10.1002/ett.4414
|View full text |Cite
|
Sign up to set email alerts
|

Robust and efficient cooperative spectrum sensing against probabilistic hard Byzantine attack

Abstract: Cognitive radio (CR) is regarded as a powerful technology to solve the problem of spectrum shortage and underutilization. As a key function of CR technology, cooperative spectrum sensing (CSS) allows secondary users (SUs) to detect the primary user (PU)'s signal so that they identify and opportunistically access the available spectrum. However, the openness of CSS paradigm makes cognitive radio networks (CRNs) suffer from Byzantine attack, thereby undermining the premise of CR framework. To this aim, we formul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

4
1

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…The studies done by Wu et al in References 6–8 employed delivery‐based assessment to evaluate the consistency of local reports from SUs. In Reference 9, Chen et al developed a differential symbol method integrated into the sequential probability ratio test (SPRT) process to the creation of a weighted differential sequential symbol that reduced the number of required report samples significantly. Gao et al have introduced a reputation algorithm to utilize a sliding window with a punishment mechanism 10 .…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…The studies done by Wu et al in References 6–8 employed delivery‐based assessment to evaluate the consistency of local reports from SUs. In Reference 9, Chen et al developed a differential symbol method integrated into the sequential probability ratio test (SPRT) process to the creation of a weighted differential sequential symbol that reduced the number of required report samples significantly. Gao et al have introduced a reputation algorithm to utilize a sliding window with a punishment mechanism 10 .…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…difficult to defend. 30,31 After all, the pursuit of maximal throughput is the primary motivation behind the malicious networks. The aim of the attacker is to achieve this goal to the greatest extent possible.…”
Section: Probabilistic Hard Byzantine Attack Modelmentioning
confidence: 99%
“…Therefore, the joint spectrum sensing and resource allocation scheme is proposed in this paper, which can be split into two subalgorithms are the selection‐majority and spectrum resource allocation (SRA) algorithm. Following our previous work, 35,36 in addition to enriching and improving the system model and the exploitation of Byzantine attack, this paper also extends to spectrum resource allocation. Specifically, the main contribution of this paper can be summarized as follows.…”
Section: Introductionmentioning
confidence: 99%