2015
DOI: 10.1109/comst.2015.2422735
|View full text |Cite
|
Sign up to set email alerts
|

Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

Abstract: The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
84
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 206 publications
(86 citation statements)
references
References 106 publications
(206 reference statements)
0
84
0
Order By: Relevance
“…Some studies have recently considered an attack model known as SSDF [32][33][34], which is a fatal threat to CSS. There are several typical attack patterns under the SSDF model, which are known as always opposite (AO), always busy (AB), always free (AF), and random disguising.…”
Section: Problem Formulationmentioning
confidence: 99%
“…Some studies have recently considered an attack model known as SSDF [32][33][34], which is a fatal threat to CSS. There are several typical attack patterns under the SSDF model, which are known as always opposite (AO), always busy (AB), always free (AF), and random disguising.…”
Section: Problem Formulationmentioning
confidence: 99%
“…For a constant β (i.e., fraction of compromised SNs) the attacker plans the optimum C i in (5) such that the FC becomes inefficient (i.e., useless). Adopting again the MDC (14), the optimisation problem can be expressed as:…”
Section: B Attacker Performance Optimisationmentioning
confidence: 99%
“…However, security issues in centralized detection using WSNs remain an open issue, see [14]- [19] and references therein. While there are many types of security threats, in this paper we focus on a single type of attack, which is the test statistic falsification (TSF) attack part of the Byzantine attacks family originally proposed by [20] and later widely used in the context of distributed detection (e.g., [19], [21], [22]).…”
Section: Introductionmentioning
confidence: 99%
“…Like all other networks [3], WSNs are also vulnerable to various security issues. Furthermore, the local SNs decision process (i.e., local detection performance) itself is subject to various security threats.…”
Section: Introductionmentioning
confidence: 99%