2019
DOI: 10.1007/s11277-019-06408-9
|View full text |Cite
|
Sign up to set email alerts
|

Secured Soft Combination Schemes Against Malicious-Users in Cooperative Spectrum Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 40 publications
0
12
0
Order By: Relevance
“…Trust-based mechanism for malicious user detected in CSS was proposed in [17]. Similar recent works can be found in [18,19] and references therein. However, the previous studies have considered the attacks restricted only to specific type and not in general.…”
Section: Background and Motivationmentioning
confidence: 66%
“…Trust-based mechanism for malicious user detected in CSS was proposed in [17]. Similar recent works can be found in [18,19] and references therein. However, the previous studies have considered the attacks restricted only to specific type and not in general.…”
Section: Background and Motivationmentioning
confidence: 66%
“…Yuan et al in [27] proposed a maximum mean discrepancy (MMD)-based secure fusion strategy to defend against intelligent SSDF attack for collaborative spectrum sensing in CRNs. Gul et al in [28] outlined different techniques to mitigate the damaging effects of the false sensing in soft decision fusion (SDF) schemes using one-to-many sensing-distances and Z-score.…”
Section: Related Workmentioning
confidence: 99%
“…As demand to the frequency spectrum resources is increasing with the increased number of wireless devices, therefore, static spectrum allocation (SSA) policy is considered to have limitations to meet these requirements [5]. The 300 GHz bandwidth that once seems to be sufficient is now becoming congested [6][7][8][9]. CRN is an intelligent wireless communication technology that has the ability to sense the radio environment and act accordingly.…”
Section: Introductionmentioning
confidence: 99%
“…The PU spectrum availability is inspected by applying various spectrum sensing techniques [6]. The SU performs local sensing by adopting sensing techniques such as energy detector (ED), matched filter detector (MFD), and cyclostationary [7]. When statistics of the PU are not available, then the ED technique is more suitable that requires only power of the PU channel.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation