2015
DOI: 10.14257/ijhit.2015.8.9.25
|View full text |Cite
|
Sign up to set email alerts
|

A Credibility-Based Defense SSDF Attacks Scheme for the Expulsion of Malicious Users in Cognitive Radio

Abstract: Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. However, the security aspects of cognitive radio networks have garnered little attention. In this paper, we identify a threat to cognitive radio networks, which we call the spectrum sensing data falsification (SSDF) attack. SSDF attack can hugely degrade the achievable detection accuracy. To counter this threat, we proposed a new method to confront the SSDF attacks by excluding malici… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Sequential detection [9][10][11][12][13][14][15][16][17][18][19] Consensus algorithm [20] Hamming distance [21] Dempster-Shafer evidence theory [22,25] Double adaptive threshold approach [23,24] Soft fusion [26] Beta function [27] Security and privacy [28,29] Green communication [30][31][32][33] Secure spectrum and energy efficiency [34] Game theory [35] Mobility management [36,37] Meanwhile, the reputation mechanism is also widely used to secure the CSS. Mapunya and Velempini propose a method to solve Byzantine attack by isolating the forged report data in Reference [20].…”
Section: Methods and Research Directions Literaturementioning
confidence: 99%
“…Sequential detection [9][10][11][12][13][14][15][16][17][18][19] Consensus algorithm [20] Hamming distance [21] Dempster-Shafer evidence theory [22,25] Double adaptive threshold approach [23,24] Soft fusion [26] Beta function [27] Security and privacy [28,29] Green communication [30][31][32][33] Secure spectrum and energy efficiency [34] Game theory [35] Mobility management [36,37] Meanwhile, the reputation mechanism is also widely used to secure the CSS. Mapunya and Velempini propose a method to solve Byzantine attack by isolating the forged report data in Reference [20].…”
Section: Methods and Research Directions Literaturementioning
confidence: 99%
“…Due to the importance of cooperation between the entities in CRN, many trust mechanisms such as Du et al and Premarathnea et al are proposed in literature to secure the collaborative exchange.…”
Section: Trm Techniques Classificationmentioning
confidence: 99%
“…The proposed algorithm considerably reduces error rate with compare to existing collaborative sensing schemes and improves the spectrum utilization. The defense scheme proposed by Hong Du, Shuang Fu and Hongna Chu [7] use the credit value with each CR user and this value is updated if sensing result is consistence with final decision. In this approach, if reputation value is greater than minimum credit threshold then CR user can take part in next round of sensing.…”
Section: Related Workmentioning
confidence: 99%