2017
DOI: 10.1155/2017/3261058
|View full text |Cite
|
Sign up to set email alerts
|

A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks

Abstract: Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary nodes can threaten these spectrum sensing results by launching passive and active attacks that prevent legitimate nodes from using the spectrum efficiently. Securing the spectrum sensing process has become an important issue in CRNs in order to ensure reliable and secure spectrum sensing a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 30 publications
0
11
0
1
Order By: Relevance
“…The nodes' BL measures the degree of security of the nodes' behavior during the spectrum sensing phase. The attacker model and capability are like the one that we proposed and used in [43], wherein the node may behave in a malicious, misbehaving, cheating, and/or selfish way to launch different attacks such as PUEA, SSDF, DoS, and objective function attack.…”
Section: A Prefacementioning
confidence: 99%
See 1 more Smart Citation
“…The nodes' BL measures the degree of security of the nodes' behavior during the spectrum sensing phase. The attacker model and capability are like the one that we proposed and used in [43], wherein the node may behave in a malicious, misbehaving, cheating, and/or selfish way to launch different attacks such as PUEA, SSDF, DoS, and objective function attack.…”
Section: A Prefacementioning
confidence: 99%
“…We simulated our proposed approach under two different simulation scenarios. Tables IV and V show the simulation parameters used referring to [42][43][44][45][46]. In the first simulation scenario shown in Table IV, we compared our proposed routing algorithm with three different state-of-the-art routing algorithms used in CRNs: COADV [19], SEARCH [14], and LAUNCH [28].…”
Section: B Simulation Environment Setupmentioning
confidence: 99%
“…The interesting part that can be gained from the work relates to the importance of understanding the dynamic behaviour of SUs. In [8,9], the authors come up with energy efficient cooperative network that considers the quality of service for wireless networks in dynamic conditions. The formulation of this approach is based on the multi-channel online optimisation.…”
Section: Related Workmentioning
confidence: 99%
“…Attack in TCP and MAC layers was presented in [19] along with the defence mechanism based on round trip time (RTT) to improve throughput. A collaborative approach was designed in [20] utilising cluster analysis to achieve high spectrum accuracy. Channel hopping‐based defence method was discussed in [21] to lessen the PUEA in CRN.…”
Section: Related Workmentioning
confidence: 99%