2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery 2011
DOI: 10.1109/cyberc.2011.104
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Management Model in Centralized Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…However, social relation based cognitive radio network research is still in its infancy [9], thus has opened up a new window for studying cooperative cognitive spectrum sensing. In [6], a social tie based scheme for spectrum sensing is proposed, however there is neither any physical layer analysis nor channel model construction.…”
Section: Related Workmentioning
confidence: 99%
“…However, social relation based cognitive radio network research is still in its infancy [9], thus has opened up a new window for studying cooperative cognitive spectrum sensing. In [6], a social tie based scheme for spectrum sensing is proposed, however there is neither any physical layer analysis nor channel model construction.…”
Section: Related Workmentioning
confidence: 99%
“…These kinds of nodes may be from one of the following categories [6]: a) Selfish node falsifies sensing outcomes and influences the channel sensing decision so that it can gain access to channels or other benefits. b) Aggressive node falsifies sensing outcomes or breaks the channel access rules which may affect PUs' or SUs' network performance.…”
Section: Trust and Reputation Management In Cognitive Radio Networkmentioning
confidence: 99%
“…Pei et al . propose the trust management model (TMM) for centralized and collaborative spectrum sensing P(1) and channel access P(2) applications in order to detect malicious SUs (including faulty and selfish) SUs and collusion attacks A(2.1), as well as to protect PUs from interference. Consider a centralized SU network comprised of a SU BS and its SU hosts.…”
Section: Trust and Reputation Management Challenges And Attack Modelsmentioning
confidence: 99%
“…For instance, Zhang and Xia and Pei et al . use hard sensing outcomes while Wang et al . and Kaligineedi et al .…”
Section: Open Issuesmentioning
confidence: 99%