2013
DOI: 10.1016/j.neucom.2012.08.005
|View full text |Cite
|
Sign up to set email alerts
|

A sensing and etiquette reputation-based trust management for centralized cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(25 citation statements)
references
References 30 publications
0
23
0
Order By: Relevance
“…Reference [6] describes the security of cooperative spectrum sensing in distributed CRNs and considers combining the location reliability and malicious intention as a method for trust measurement to increase the success rate of detecting malicious nodes. The double reputation trust management in CRNs is proposed in [7] to govern SUs. The trustiness of SUs based on sensing reputation and etiquette reputation during spectrum sensing and allocation is the evidence of optimizing the data fusion and spectrum allocation policy.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [6] describes the security of cooperative spectrum sensing in distributed CRNs and considers combining the location reliability and malicious intention as a method for trust measurement to increase the success rate of detecting malicious nodes. The double reputation trust management in CRNs is proposed in [7] to govern SUs. The trustiness of SUs based on sensing reputation and etiquette reputation during spectrum sensing and allocation is the evidence of optimizing the data fusion and spectrum allocation policy.…”
Section: Related Workmentioning
confidence: 99%
“…To address the above issues, various secure CSS schemes have been proposed [5][6][7][8][9][10][11][12][13]. When simple attack patterns are adopted by only a few malicious users (MUs) in CRNs, the schemes presented in [5][6][7] can work well enough.…”
Section: Introductionmentioning
confidence: 99%
“…When simple attack patterns are adopted by only a few malicious users (MUs) in CRNs, the schemes presented in [5][6][7] can work well enough. The concept of applying the trust and reputation model in CRNs has also attracted interest recently [8][9][10][11][12]. A reputation-based secure CSS algorithm with trusted node assistance based on [5][6][7] was proposed in [8], which started with trusted SUs merely to assure the inerrability of global decision making.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations