2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) 2018
DOI: 10.1109/icabcd.2018.8465461
|View full text |Cite
|
Sign up to set email alerts
|

Trust-Based System to Defend Against the Spectrum Sensing Data Falsification Attack in Cognitive Radio Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…In [24] and with the aid of the Thompson sampling technique, an online primary user emulation attack was investigated. In [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], novel algorithms were proposed by considering the energy efficiency, spectrum maintenance, bandwidth guaranteeing, robustness, complexity, deep-learning hardware/software, probabilisticity, secure fusion strategies, specific channel models e.g. Nakagami-m fading etc.…”
Section: A Related Workmentioning
confidence: 99%
“…In [24] and with the aid of the Thompson sampling technique, an online primary user emulation attack was investigated. In [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], novel algorithms were proposed by considering the energy efficiency, spectrum maintenance, bandwidth guaranteeing, robustness, complexity, deep-learning hardware/software, probabilisticity, secure fusion strategies, specific channel models e.g. Nakagami-m fading etc.…”
Section: A Related Workmentioning
confidence: 99%
“…On the other hand, the flexibility of CRNs system brings about susceptibilities that may allow an attacker to masquerade as a SU leading to a spectrum sensing data falsification (SSDF) attack [4]. In SSDF attacks, malicious SUs forward falsify local sensing results to the FC to mislead the universal decision.…”
Section: Introductionmentioning
confidence: 99%
“…Some SSDF attack detection algorithms have been proposed to detect malicious SUs in CSS [6], however, the problem in the CRN with SSDF attack is still an open issue. In [4], SSDF in CSS was solved via a trust-based system; however, this technique required prior knowledge of the PU signal. These requirements are incongruous when applying to high mobile CRN, and to such systems in which the information of the PU is not entirely known.…”
Section: Introductionmentioning
confidence: 99%