International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014 - Malaysia) 2014
DOI: 10.1049/cp.2014.1407
|View full text |Cite
|
Sign up to set email alerts
|

Trust and reputation scheme for clustering in cognitive radio networks

Abstract: Cognitive radio is the next-generation wireless communication network that improves the efficiency of the radio spectrum through exploitation of underutilized licensed spectrum (or white spaces). This paper applies a reinforcement learning-based Trust and Reputation Management (TRM) scheme to cluster-based routing and shows network performance enhancement, including throughput and rewards. Generally speaking, clustering forms logical groups of nodes throughout the entire network, and routing establishes routes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…In this context, the authors in one study are interested in securing the cluster from the harmful attacks by proposing a reinforcement learning–based trust and a reputation management approach to determine the credibility of a specific node as time goes by, and to select a honest node as CH in the cluster topology. In fact, due to the reinforcement learning, each SU can keep track and can learn about the neighbor behavior.…”
Section: Trm: Definition and Conceptsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this context, the authors in one study are interested in securing the cluster from the harmful attacks by proposing a reinforcement learning–based trust and a reputation management approach to determine the credibility of a specific node as time goes by, and to select a honest node as CH in the cluster topology. In fact, due to the reinforcement learning, each SU can keep track and can learn about the neighbor behavior.…”
Section: Trm: Definition and Conceptsmentioning
confidence: 99%
“…Therefore, using trust management as a security mechanism for this architecture seems to be very efficient. Several approaches are proposed in literature such as the trust mechanism proposed in Koh et al to secure the cluster‐based architecture.…”
Section: Trm Techniques Classificationmentioning
confidence: 99%