2015 International Conference on Information Technology (ICIT) 2015
DOI: 10.1109/icit.2015.25
|View full text |Cite
|
Sign up to set email alerts
|

A Regression Based Spectrum-Sensing Data - Falsification Attack Detection Technique in CWSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…Although plenty of the literature and comprehensive research on SSDF attack and defense has been made, most of them will be not specifically suited for CWSNs [23,24]. Basically, the reason is that the framework of resourceconstrained sensor nodes are not be considered, especially in aspect of the limitation of processing capacity and battery power.…”
Section: Related Workmentioning
confidence: 99%
“…Although plenty of the literature and comprehensive research on SSDF attack and defense has been made, most of them will be not specifically suited for CWSNs [23,24]. Basically, the reason is that the framework of resourceconstrained sensor nodes are not be considered, especially in aspect of the limitation of processing capacity and battery power.…”
Section: Related Workmentioning
confidence: 99%
“…Our algorithm has a low false‐positive rate and it has lower time and space overheads than the bloom filter‐based algorithm. The running time, memory requirement and communication overheads of our proposed algorithm are explained in Section 7.1, which is less compared to the existing algorithm in the literature. (ii) The maximum match filter (MMF) algorithm is used to detect the SSDF attack [12]. When the CND algorithm is used along with the MMF algorithm, the performance of the MMF algorithm is enhanced.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…Our algorithm will consider a maximum number of similar reports for a collaborative spectrum sensing decision [12]. We make a regression plane depending upon the similarity of different sensing results to avoid false sensing reports and to take proper decisions about the spectrum band.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this scenario, the original licensed owner of the spectrum is called the Primary User and the cognitive sensor nodes are called the Secondary User [5]. This method of spectrum sharing is called Opportunistic Spectrum Sharing (OSS) [4] [1].The benefit of the OSS technique can be enjoyed by the user only when the network is properly deployed and the security threats of such networks can be robustly handled [14]. To ensure the trustworthiness of the network the spectrum sensing process is an important problem that needs to be addressed.…”
Section: Introductionmentioning
confidence: 99%