2014 International Wireless Communications and Mobile Computing Conference (IWCMC) 2014
DOI: 10.1109/iwcmc.2014.6906348
|View full text |Cite
|
Sign up to set email alerts
|

A cooperative spectrum sensing scheme based on task assignment algorithm for cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…e artificial bee colony clustering (ABCC) algorithm in [11] is competent to reduce and stabilize the energy expenditure of the cooperative users. In CSS, SUs make their own local decisions about the PU existence and forward it to the fusion center (FC) for further analysis [12,13]. CSS is exposed to the false sensing reports of malicious users (MUs), therefore identification and exclusion of MU reports in the cooperative scheme is essential for minimizing their adverse effects.…”
Section: Introductionmentioning
confidence: 99%
“…e artificial bee colony clustering (ABCC) algorithm in [11] is competent to reduce and stabilize the energy expenditure of the cooperative users. In CSS, SUs make their own local decisions about the PU existence and forward it to the fusion center (FC) for further analysis [12,13]. CSS is exposed to the false sensing reports of malicious users (MUs), therefore identification and exclusion of MU reports in the cooperative scheme is essential for minimizing their adverse effects.…”
Section: Introductionmentioning
confidence: 99%
“…CSS is investigated as an efficient detection method in the presence of primary user emulation attack in [16]. Priority values are assigned to SUs based on reputation results of each SU in [17][18][19][20] to give less importance to the sensing results of SUs with a reputation below threshold. A reputation-based CSS method is proposed in [21] that improves the system performance by detecting and rejecting the Byzantine malicious users, in order to improve system performance and efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…A third architecture commonly associated with CRN is cooperative and non-cooperative architectures. For the cooperative design, the SUs work together to make decisions on such things as spectrum sensing, so that their decisions are usually multilateral and centrally controlled [15,16]. Furthermore, cooperation can be between the PU network and the SU network [17,18].…”
Section: Introductionmentioning
confidence: 99%