2012 IEEE 75th Vehicular Technology Conference (VTC Spring) 2012
DOI: 10.1109/vetecs.2012.6240040
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced D-S Theory Cooperative Spectrum Sensing Algorithm against SSDF Attack

Abstract: The current D-S theory cooperative spectrum sensing algorithms think all cognitive users are honest and don't consider malicious user existing. When a malicious user falsifies its local sensing result and sends error data to the data fusion center, it will damage the cooperative spectrum sensing performance badly, which is called spectrum sensing data falsification (SSDF) attack. Due to the difference between the malicious user's evidence and other cognitive users', we use the similarity degree to calculate th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(33 citation statements)
references
References 14 publications
0
33
0
Order By: Relevance
“…Here, we presented four CSS schemes based on D-S evidence theory: 'D-S Cre' (Cre is the abbreviation for Credibility) represents our proposed faithworthy CSS scheme; the curve of 'D-S Men' (Men represents the author in [17]) shows the robust CSS method with mutually supportive degree presented in [17]; another enhanced scheme with similarity degree calculation proposed in [16] is shown as 'D-S Han'; and 'D-S Nhan' represents the enhanced scheme with reliability source evaluation proposed in [15]. Besides, 'OPT LIN' shows the optimal linear CSS scheme proposed in [13], and 'SINGLE' shows the spectrum sensing scenario of single SU.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, we presented four CSS schemes based on D-S evidence theory: 'D-S Cre' (Cre is the abbreviation for Credibility) represents our proposed faithworthy CSS scheme; the curve of 'D-S Men' (Men represents the author in [17]) shows the robust CSS method with mutually supportive degree presented in [17]; another enhanced scheme with similarity degree calculation proposed in [16] is shown as 'D-S Han'; and 'D-S Nhan' represents the enhanced scheme with reliability source evaluation proposed in [15]. Besides, 'OPT LIN' shows the optimal linear CSS scheme proposed in [13], and 'SINGLE' shows the spectrum sensing scenario of single SU.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Therefore, we can evaluate the real-time reliability of SU i based on its reports' similarity with other SUs at each sensing round. Specifically, the similarity degree of reported BPAs between SU i and SU j can be represented by the following formulation [16]:…”
Section: Real-time Reliabilitymentioning
confidence: 99%
“…According to the central limit theorem, when U is large enough (e.g., U >> 10), x Ei can be well approximated as a Gaussian random variable under both hypotheses H 0 and H 1 as follows [14,16,17]:…”
Section: Spectrum Sensing Preliminariesmentioning
confidence: 99%
“…The attack model in (5) is general enough to include the existing models as special cases, via properly adjusting the attack parameters (u 2i , u 3i , p i ). For example, Always No [13], Always Yes [14,15], and Always Adverse attacks [16] can be realized when (u 2i , u 3i , p i ) is set as (u 0i , u 0i , 1), (u 1i , u 1i , 1) and (u 1i , u 0i , 1), respectively. In particular, the attack probability p i can make the proposed attack more elusory and flexible.…”
Section: Local Decisionmentioning
confidence: 99%
See 1 more Smart Citation