2020
DOI: 10.1155/2020/2509081
|View full text |Cite
|
Sign up to set email alerts
|

A Genetic Algorithm-Based Soft Decision Fusion Scheme in Cognitive IoT Networks with Malicious Users

Abstract: Internet of ings (IoT) is a new challenging paradigm for connecting a variety of heterogeneous networks. Since its introduction, many researchers have been studying how to efficiently exploit and manage spectrum resource for IoT applications. An explosive increase in the number of IoT devices accelerates towards the future-connected society but yields a high system complexity. Cognitive radio (CR) technology is also a promising candidate for future wireless communications. CR via dynamic spectrum access provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
2

Relationship

3
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…In this configuration, malicious devices sending false information can cause the severe degradation of the performance of the network. Khan et al [117] proposed the mitigation to these attacks using GA-based soft decision fusion. This scheme achieved better performance and a lower probability of errors than conventional schemes.…”
Section: Evolutionary Techniques For Securitymentioning
confidence: 99%
“…In this configuration, malicious devices sending false information can cause the severe degradation of the performance of the network. Khan et al [117] proposed the mitigation to these attacks using GA-based soft decision fusion. This scheme achieved better performance and a lower probability of errors than conventional schemes.…”
Section: Evolutionary Techniques For Securitymentioning
confidence: 99%
“…Influenced by certain motives, malicious users (MUs) intrude into the CSS networks. The security threats and protection of CSS from the malicious users (MUs) are currently the major concern for researchers [25][26][27]. The work in [28][29][30] examined defensive mechanisms to reduce the presence of Byzantine attacks, jamming attacks, and primary user emulation attackers (PUEA).…”
Section: Introductionmentioning
confidence: 99%
“…Some heuristic approaches in CSS can lead to an optimal global decision. Among them, a genetic algorithm (GA), a class of computational algorithm motivated by evolution, is a good candidate to find the optimal solution by applying bioinspired approaches to given problems [17,18]. On the other hand, a machine learning (ML) technique is another good candidate by learning surrounding environments.…”
Section: Introductionmentioning
confidence: 99%