2016
DOI: 10.1109/lcomm.2015.2499286
|View full text |Cite
|
Sign up to set email alerts
|

Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(24 citation statements)
references
References 9 publications
0
24
0
Order By: Relevance
“…Of the various existing security threats, SSDF and PUEA are very common and draw much attention to the research community. Efforts have been made to detect and defend against these attacks …”
Section: Related Work On Security In Cssmentioning
confidence: 99%
“…Of the various existing security threats, SSDF and PUEA are very common and draw much attention to the research community. Efforts have been made to detect and defend against these attacks …”
Section: Related Work On Security In Cssmentioning
confidence: 99%
“…The communication channel between the CR users and FC is assumed to be an error-free reporting channel. The probabilities of PU signal detection and false alarm are computed by (5) where (. ) Q is the tail probability of standard normal distribution.…”
Section: System Model and Energy Detection Schemementioning
confidence: 99%
“…During SSDF attacks, CR attackers send falsified spectrum sensing results to the FC and disrupt the global sensing decision. To overcome the impact of SSDF attacks, several different solutions have been proposed in previously [5][6][7]. In PUEA, a malicious attacker mimics some characteristics of the legitimate PU's signal.…”
Section: Introductionmentioning
confidence: 99%
“…It includes four consecutive procedures, which are (1) basic probability assignment (BPA) with this approach, (2) holistic credibility calculation, (3) option and amelioration for BPA, and (4) evidence combination via the D-S rule, respectively [15]. In [16], a new method was proposed, which estimated the attack strength and applies it in the k−out−N rule to obtain the optimum value of k that minimizes the Bayes risk.…”
Section: Introductionmentioning
confidence: 99%