2016
DOI: 10.1007/s11277-016-3331-8
|View full text |Cite
|
Sign up to set email alerts
|

Securing Collaborative Spectrum Sensing Against Malicious Attackers in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…If those AIDs launch a simple attack characteristic, they can be easily identified by the decision fusion criteria at the FC. In fact, such a type of always attack has been extensively studied in [32][33][34][35][36][37][38]; the defense schemes in these references have shown satisfactory performance in some settings; however, when confronting the sophisticated attack probability (ie, a pair of attack probability 1 and 0 varying from 0 to 1), most of them are bound to fail.…”
Section: Sensing Data Falsification Attack Modelmentioning
confidence: 99%
“…If those AIDs launch a simple attack characteristic, they can be easily identified by the decision fusion criteria at the FC. In fact, such a type of always attack has been extensively studied in [32][33][34][35][36][37][38]; the defense schemes in these references have shown satisfactory performance in some settings; however, when confronting the sophisticated attack probability (ie, a pair of attack probability 1 and 0 varying from 0 to 1), most of them are bound to fail.…”
Section: Sensing Data Falsification Attack Modelmentioning
confidence: 99%
“…AF attack boils down to a combination of AY and AN attack ( α = β = 1). Furthermore, as for attack strategy, α = β is too ideal to be achieved in [ 9 ] [ 28 ] etc. Such a view totally overlooks the fact that FAA and MDA are independent.…”
Section: System Modelmentioning
confidence: 99%
“…On the basis of WSPRT, [ 8 ] analyzed the CSS performance when there exist attackers based on the cumulative reputation, and proposed an effective scheme by employing Orthogonalized Gnanadesikan-Kettenring (OGK) to improve the robustness of CRNs. In [ 9 ], Sharifi AA and Niya JM proposed an attack-aware CSS (ACSS) method to estimate the credit value of each CR user and identify attackers along with their attack strategies. The similar work was presented in [ 10 ], an attack-aware WSPRT algorithm estimates the attack extension factor in a network, based on the standard deviation of received sensing reports for improving the CSS performance.…”
Section: Introductionmentioning
confidence: 99%
“…Spectrum sensing is the premise of the successful implementation of CR [6,7]. Among various spectrum sensing techniques, energy detection is widely used due to its low implementation complexity and without any prior knowledge about signal features [8].…”
Section: Introductionmentioning
confidence: 99%