2020
DOI: 10.1109/jsyst.2019.2952395
|View full text |Cite
|
Sign up to set email alerts
|

Cost-Benefit Tradeoff of Byzantine Attack in Cooperative Spectrum Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…Taking advantage of the rich audit data set, the authors in [109] present two anomaly detection scheme for detecting the malicious nodes. The first scheme exploits the frequency property of such statistical data and develops a lightweight intrusion detection scheme.…”
Section: Mechanism Of Ssdf Attacksmentioning
confidence: 99%
“…Taking advantage of the rich audit data set, the authors in [109] present two anomaly detection scheme for detecting the malicious nodes. The first scheme exploits the frequency property of such statistical data and develops a lightweight intrusion detection scheme.…”
Section: Mechanism Of Ssdf Attacksmentioning
confidence: 99%
“…From the above three types of Byzantine attack, it can be seen that they are basically static attacks. From the perspective of MUs, although this kind of always attack has a great negative impact on CSS (it also requires a large attack cost 42 ), but only takes effect in some traditional data fusion technologies, that is, decision rule (including Or, And, Majority rule). For other data fusion technologies with Byzantine defense algorithms, always attack can be easily identified and eliminated.…”
Section: Probabilistic Hard Byzantine Attack Modelmentioning
confidence: 99%
“…In consideration of their own attack risks, MUs do not always adopt such extreme attack strategies because extreme attack strategies will soon fail to deploy due to low reputation in common reputation-based methods. From a long-term perspective, the intermittent or interval attack strategies will not be discovered immediately, the MU has a certain degree of concealment and remains in CRNs for a long time [28]. In this regard, we start with a probabilistic attack strategy to develop a generalized and flexible Byzantine attack model.…”
Section: Byzantine Attack Modelmentioning
confidence: 99%