2015 International Conference on Computational Intelligence and Networks 2015
DOI: 10.1109/cine.2015.46
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison Based Clustering Algorithm to Counter SSDF Attack in CWSN

Abstract: Cognitive Wireless Sensor Networks follow IEEE 802.22 standard which is based on the concept of cognitive radio. In this paper we have studied the Denial of Service (DOS) attack. Spectrum Sensing Data Falsification (SSDF) attack is one such type of DOS attack. In this attack the attackers modify the sensing report in order to compel the Secondary User (SU) to take a wrong decision regarding the vacant spectrum band in other's network. In this paper we have proposed a similaritybased clustering of sensing data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
(4 reference statements)
0
2
0
Order By: Relevance
“…The identification of a large amount of the attacking nodes was enabled, and the false detection rate of the honest nodes was reduced. Chatterjee and Chatterjee studied about the denial of service attack and introduced a similarity‐based clustering of the sensing data for provide a security measure against the spectrum sensing data falsification (SSDF) attack.…”
Section: Related Workmentioning
confidence: 99%
“…The identification of a large amount of the attacking nodes was enabled, and the false detection rate of the honest nodes was reduced. Chatterjee and Chatterjee studied about the denial of service attack and introduced a similarity‐based clustering of the sensing data for provide a security measure against the spectrum sensing data falsification (SSDF) attack.…”
Section: Related Workmentioning
confidence: 99%
“…In [8], the author proposes the utility self-information and the real utility entropy of information, which extends the range of information entropy from non-negative numbers to real numbers. In [9], the author proposed a similarity-based clustering of sensing data to counter the above attack. In [10], the author proposes a reputation based clustering algorithm that does not require prior knowledge of attacker distribution or complete identification of malicious users.…”
Section: Introductionmentioning
confidence: 99%