2020
DOI: 10.4218/etrij.2019-0388
|View full text |Cite
|
Sign up to set email alerts
|

Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things

Abstract: Internet of Things (IoT) is considered the future network to support wireless communications. To realize an IoT network, sufficient spectrum should be allocated for the rapidly increasing IoT devices. Through cognitive radio, unlicensed IoT devices exploit cooperative spectrum sensing (CSS) to opportunistically access a licensed spectrum without causing harmful interference to licensed primary users (PUs), thereby effectively improving the spectrum utilization. However, an open access cognitive IoT allows abno… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…The authors of [28] have suggested a model of complex attack for falsifying sensing data. Afterward, they proposed a weighted sequential hypothesis test (WSHT) to enhance the detection accuracy of the prime user to reduce the sampling number, which involves a status-trust evaluation mechanism of data transmission to ensure the availability of sensing data as well as a test of sequential hypothesis.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [28] have suggested a model of complex attack for falsifying sensing data. Afterward, they proposed a weighted sequential hypothesis test (WSHT) to enhance the detection accuracy of the prime user to reduce the sampling number, which involves a status-trust evaluation mechanism of data transmission to ensure the availability of sensing data as well as a test of sequential hypothesis.…”
Section: Related Workmentioning
confidence: 99%
“…Smart home devices communicate with application server in order to achieve services. Attacker could compromise the gateway routing table and could collect packets that will permit them to get confidential information [87]. However, SSL (secure socket layer) technique [88] is used, an attacker can bypass the forged certificate.…”
Section: Falsificationmentioning
confidence: 99%
“…Such methods have been extensively employed for attack detection, for example: In [3] such an algorithm is used to detect a Link flooding attack on an IoT Network, in [4] Hypothesis Testing is used against spectrum sensing data falsification in cognitive IoT Networks while in [5] Li et. al use it to empower an distributed attack detection System.…”
Section: A Statistical Hypothesis Testing In the Context Of Iot Networkmentioning
confidence: 99%