GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference 2009
DOI: 10.1109/glocom.2009.5425380
|View full text |Cite
|
Sign up to set email alerts
|

CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
60
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 87 publications
(60 citation statements)
references
References 13 publications
0
60
0
Order By: Relevance
“…Similarly, we get equations (14) and (15), by differentiating ln Λ γ and ln Λ ρ , and equating them to 0. To ensure that the likelihood is positive, ρ has to lie in the interval (0, 1/(K L + 1)).…”
Section: Ss S ∈ H and N (S)mentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, we get equations (14) and (15), by differentiating ln Λ γ and ln Λ ρ , and equating them to 0. To ensure that the likelihood is positive, ρ has to lie in the interval (0, 1/(K L + 1)).…”
Section: Ss S ∈ H and N (S)mentioning
confidence: 99%
“…For instance, in [11], the primary user emulation attack was described and a transmitter verification scheme was proposed to distinguish a primary user from other sources; [12] discussed the attack where malicious users attempted to mislead the learning process of secondary users; denial-of-service attacks were considered and potential protection remedies were discussed in [13]; in [14], a malicious user reporting false sensing results would be found and excluded from the collaborative spectrum sensing when the calculated "suspicious" level was high; in [15], an information secrecy game was developed to foster collaboration between primary users and secondary users against eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…For example, statistics-based anomaly detection has been proposed [12], [14], [17], [18]. Chen et al [12] proposed a sensor reputation management framework that assigns different weights to sensing reports based on their reputation achieved from a previous sensing history.…”
Section: Related Workmentioning
confidence: 99%
“…Existing research on SSDF attacks often assume the existence of a fusion center that collects local measurements and makes the final decision of whether primary users are present or absent [2], [6], [8]- [12]. They also assume that a common control channel for information exchange in the protocol.…”
Section: Introductionmentioning
confidence: 99%