2013
DOI: 10.1109/tifs.2013.2273305
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(33 citation statements)
references
References 14 publications
0
33
0
Order By: Relevance
“…Deshpande et al propose the disengagement of mobile clients from scanning via the utilization of historical RSSI values at revisited locations [4]. In cognitive networks that operate in channels exhibiting identical propagation characteristics, mobile secondary users opportunistically access spectrum that is not occupied by primary users [19] and enable collaborative spectrum sensing [20].…”
Section: Maws Vs Alternatives For Mobile Accessmentioning
confidence: 99%
“…Deshpande et al propose the disengagement of mobile clients from scanning via the utilization of historical RSSI values at revisited locations [4]. In cognitive networks that operate in channels exhibiting identical propagation characteristics, mobile secondary users opportunistically access spectrum that is not occupied by primary users [19] and enable collaborative spectrum sensing [20].…”
Section: Maws Vs Alternatives For Mobile Accessmentioning
confidence: 99%
“…And each trust model is described in detail. Reference [6] describes the security of cooperative spectrum sensing in distributed CRNs and considers combining the location reliability and malicious intention as a method for trust measurement to increase the success rate of detecting malicious nodes. The double reputation trust management in CRNs is proposed in [7] to govern SUs.…”
Section: Related Workmentioning
confidence: 99%
“…RELATED WORK SSDF attacks [6] under the centralized network model with SUs are studied in literature [7]- [9]. In [7], authors presented a framework to collect spectrum sensing data from diverse sources in a grid of square cells.…”
Section: Introductionmentioning
confidence: 99%
“…Authors in [8] proposed outlier detection techniques without complete information of a PU and plenty of sensing data samples to identify malicious SUs. A trust-based collaborative spectrum sensing scheme was presented in [9], in which authors utilized Location Reliability and Malicious Intention as two trust measurements when spectrum sensing data are fused and decisions are made in a center.…”
Section: Introductionmentioning
confidence: 99%