2014 IEEE Conference on Communications and Network Security 2014
DOI: 10.1109/cns.2014.6997465
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based data fusion mechanism design in cognitive radio networks

Abstract: Abstract-Cognitive radio is a promising solution for spectrum scarcities in the future. Secondary users (SUs) adopt cooperative sensing to learn the primary user's (PU's) occupancy activity. This paper develops a trust-based data aggregation scheme to cope with malicious SU attack in cooperative spectrum sensing in cognitive radio networks. The proposed scheme combines the first-hand and second-hand sensing evidence to guarantee the overall performance and adopts a static game model to discourage malicious SUs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…In [24], a Stackelberg game was utilized in order to mitigate the SSDF attack to detect the corrupted nodes reports in WSNs-based CR. Meanwhile, in [36], the problem of fake inspections sent by malicious SUs in CRNs due to the SSDF was studied using static game approach to establish a statistical trust model. In [24,36], the energy detection method has been employed with game theory to detect the malicious nodes behavior due to the SSDF attack.…”
Section: Introductionmentioning
confidence: 99%
“…In [24], a Stackelberg game was utilized in order to mitigate the SSDF attack to detect the corrupted nodes reports in WSNs-based CR. Meanwhile, in [36], the problem of fake inspections sent by malicious SUs in CRNs due to the SSDF was studied using static game approach to establish a statistical trust model. In [24,36], the energy detection method has been employed with game theory to detect the malicious nodes behavior due to the SSDF attack.…”
Section: Introductionmentioning
confidence: 99%
“…Through this reinforcement-based approach, past reports are therefore considered for the computation of decisions. Examples of schemes following this approach may be found in the collaborative sensing solutions proposed by Wang et al [20], Wang and Chen [34], and by Zeng, Paweczak, and Cabric [21]. In the former, the nodes are classified either as honest or as malicious, with all nodes initially assumed to be honest.…”
Section: Deployment Of Dedicated Trusty Sensorsmentioning
confidence: 99%
“…For instance, Min, Shin, and Hu [33] assume in their work that at least two thirds of the nodes are well behaving. On the contrary, Wang and Chen [34] propose a data fusion scheme for centralized CR networks that tolerates a high percentage of malicious SUs. This strength results from allowing the data fusion center to also sense the spectrum and use its own outcomes to assess the honesty of the SUs.…”
Section: Deployment Of Dedicated Trusty Sensorsmentioning
confidence: 99%
See 2 more Smart Citations