2020
DOI: 10.1155/2020/8846948
|View full text |Cite
|
Sign up to set email alerts
|

Support Vector Machine-Based Classification of Malicious Users in Cognitive Radio Networks

Abstract: Cognitive radio is an intelligent radio network that has advancement over traditional radio. The difference between the traditional radio and the cognitive radio is that all the unused frequency spectrum can be utilized to the best of available resources in the cognitive radio unlike the traditional radio. The core technology of cognitive radio is spectrum sensing, in which secondary users (SUs) opportunistically access the spectrum while avoiding interference to primary user (PU) channels. Various aspects of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 23 publications
0
10
0
Order By: Relevance
“…This is achieved through numerical simulations via Matlab. Monte-Carlo simulations were carried out using the simulation parameters listed in Table II below which are based on the rationale of the other researchers [26], [27], [31]. The performance of the proposed scheme based on the ML algorithm is compared with similar schemes, such as SVM based classification of MUs in CRNs [27], the detection of malicious PU emulation based on a SVM for a mobile CRN using software-defined radio [26], and CSS algorithm based on SVM against spectrum sensing-data-falsification (SSDF) attack [31].…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…This is achieved through numerical simulations via Matlab. Monte-Carlo simulations were carried out using the simulation parameters listed in Table II below which are based on the rationale of the other researchers [26], [27], [31]. The performance of the proposed scheme based on the ML algorithm is compared with similar schemes, such as SVM based classification of MUs in CRNs [27], the detection of malicious PU emulation based on a SVM for a mobile CRN using software-defined radio [26], and CSS algorithm based on SVM against spectrum sensing-data-falsification (SSDF) attack [31].…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…where δ is an arbitrary constant, w is the weight vector, and b is a threshold value. The margin (overlap region) in the training phase can be obtained as follows [18 ]:…”
Section: Support Vector Machine Regression (Svm)mentioning
confidence: 99%
“…In this subsection, we compare the results obtained by the proposed with prior research works. We have compared the proposed work with prior works SVM [46], ML-Neural Network (ML-NN) [47], 2D-Beamforming [48], OLSR [49], and 5G-VANET [50]. The detailed comparison among existing works is summarized in Table 4.…”
Section: Comparative Analysismentioning
confidence: 99%