2014
DOI: 10.1109/tpds.2013.73
|View full text |Cite
|
Sign up to set email alerts
|

Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 24 publications
0
17
0
Order By: Relevance
“…Li et al have shown the performance comparison of their algorithms with that of SCST under different malicious ratios in [12]. We compare the performance of our proposed algorithm with that of SCST by varying the malicious user ratio, network scale, rank order and compression ratio.…”
Section: B Sensing Decisionsmentioning
confidence: 99%
“…Li et al have shown the performance comparison of their algorithms with that of SCST under different malicious ratios in [12]. We compare the performance of our proposed algorithm with that of SCST by varying the malicious user ratio, network scale, rank order and compression ratio.…”
Section: B Sensing Decisionsmentioning
confidence: 99%
“…2. Data injection attack [17,18,28] We take into consideration a second type of attack where the malicious users send falsified sensing reports to fool the FC. In fact, a malicious user may:…”
Section: Adversary Modelmentioning
confidence: 99%
“…This process is usually inconvenient and requires significant overhead. In [18], the authors present a new scheme that can calculate a trust value for each secondary user based on a comparison between its sensing report and the reports of its neighborhood. However, the trust value may give wrong results in some realizations of the channels if the neighborhood detected wrong sensing report.…”
Section: Introductionmentioning
confidence: 99%
“…Each v∈V S is equipped with q cognitive radios, which are able to detect available data channels [7] [8]. Each SU is also equipped with a traditional wireless interface, which forms a common control channel (CCC) to transmit control messages (such as RREQ in section V).…”
Section: System Model and Problem Formulationmentioning
confidence: 99%