Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking 2021
DOI: 10.1145/3427477.3429992
|View full text |Cite
|
Sign up to set email alerts
|

Trust Aware Scheme based Malicious Nodes Detection under Cooperative Spectrum Sensing for Cognitive Radio Networks

Abstract: Emerging of Cognitive Radio (CR) technology has provided optimistic solution for the dearth of spectrum by improving the spectrum utilization. The opportunistic use of the spectrum is enabled by spectrum sensing which is one of the key functionality of CR systems. To perform the interference free transmission in a cognitive radio networks, an important part for unlicensed user is to identify a licensed user with the help of spectrum sensing. Recently, the Cooperative Spectrum Sensing has been widely used in th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Malicious nodes bloat their competency to meet with the destination node to intercept the message coming from sender nodes, which results in a degradation in network performance 15,16 . As a result, a trustworthy and secure message transmission protocol is a challenge that checks on the node's behavior for assisting other nodes in forwarding messages and does not support any attack, deception, and camouflage 17,18 . Moreover, social OppIoT supports a social Oppnets phenomenon in which most nodes are interested in cooperating with other nodes who frequently meet at an ordinary time, space and have familiar neighbors' history and behavior.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Malicious nodes bloat their competency to meet with the destination node to intercept the message coming from sender nodes, which results in a degradation in network performance 15,16 . As a result, a trustworthy and secure message transmission protocol is a challenge that checks on the node's behavior for assisting other nodes in forwarding messages and does not support any attack, deception, and camouflage 17,18 . Moreover, social OppIoT supports a social Oppnets phenomenon in which most nodes are interested in cooperating with other nodes who frequently meet at an ordinary time, space and have familiar neighbors' history and behavior.…”
Section: Introductionmentioning
confidence: 99%
“…15,16 As a result, a trustworthy and secure message transmission protocol is a challenge that checks on the node's behavior for assisting other nodes in forwarding messages and does not support any attack, deception, and camouflage. 17,18 Moreover, social OppIoT supports a social Oppnets phenomenon in which most nodes are interested in cooperating with other nodes who frequently meet at an ordinary time, space and have familiar neighbors' history and behavior. Therefore trust measurement of the nodes based on multiple factors of collaboration needs to be solved urgently.…”
mentioning
confidence: 99%