2018
DOI: 10.1109/tvt.2018.2841362
|View full text |Cite
|
Sign up to set email alerts
|

Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…But, CSSDF attackers may be easily detected with an abnormality detection algorithm by analyzing their highest similarities, if they launch SSDF in the static manner. Except for DSSDF and CSSDF attack, CFF attack is also found in our previous publication [21]. Since the feedback data from initiator SUs are generally unchecked, one of CFF attackers can disguise as an initiator SU who sends the feedback in accordance with the sensing data of their conspirators who play the role of cooperating SUs, resulting in promoting their conspirators' trust value quickly.…”
Section: Dc-ssdf Attack Overviewmentioning
confidence: 91%
See 1 more Smart Citation
“…But, CSSDF attackers may be easily detected with an abnormality detection algorithm by analyzing their highest similarities, if they launch SSDF in the static manner. Except for DSSDF and CSSDF attack, CFF attack is also found in our previous publication [21]. Since the feedback data from initiator SUs are generally unchecked, one of CFF attackers can disguise as an initiator SU who sends the feedback in accordance with the sensing data of their conspirators who play the role of cooperating SUs, resulting in promoting their conspirators' trust value quickly.…”
Section: Dc-ssdf Attack Overviewmentioning
confidence: 91%
“…Since the feedback data from initiator SUs are generally unchecked, one of CFF attackers can disguise as an initiator SU who sends the feedback in accordance with the sensing data of their conspirators who play the role of cooperating SUs, resulting in promoting their conspirators' trust value quickly. A two-level defense scheme called FeedGuard from the design ideas of feedback trust and I-C frequency correlation analysis is proposed in [21] to defend against CFF attack.…”
Section: Dc-ssdf Attack Overviewmentioning
confidence: 99%
“…The presence of MUs may severely degrade the detection performance of CSS system [21]. There are two purposes for MUs to attack the CSS system, which are to destroy the spectrum sensing system and obtain its own benefits, respectively [22], [23].…”
Section: B Attack Modelmentioning
confidence: 99%
“…In [23], Jaglan et al introduced artificial neural network (ANN) at the FC thereby achieving significant improvement in detection performance and reduction in false alarm rate as compared to conventional schemes. Feng et al reported the collusive SSDF attack method and proposed a two-level (the request-level and feedback-level) and XDA defence scheme from the perspective of XOR distance analysis to defend against this attack in [24,25], respectively. Khan et al in [26] proposed a double adaptive thresholding technique in order to differentiate legitimate users from doubtful and malicious users.…”
Section: Related Workmentioning
confidence: 99%