2012
DOI: 10.1016/j.adhoc.2011.01.020
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic cooperator selection in cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…Vučević et al [38] propose a RL model with suitability value for TRM S(1) applied to channel sensing P(1) in order to identify honest nodes for collaboration in CRNs. In this model, each node selects its neighbor nodes to collaborate by evaluating their suitability values, which are derived from the outcome of the final decisions.…”
Section: Rl Model With Suitability Valuementioning
confidence: 99%
See 4 more Smart Citations
“…Vučević et al [38] propose a RL model with suitability value for TRM S(1) applied to channel sensing P(1) in order to identify honest nodes for collaboration in CRNs. In this model, each node selects its neighbor nodes to collaborate by evaluating their suitability values, which are derived from the outcome of the final decisions.…”
Section: Rl Model With Suitability Valuementioning
confidence: 99%
“…A.2 Unintentional attack. In this attack, non-malicious nodes unintentionally launch attacks (e.g., generating inaccurate sensing outcomes and making incorrect decisions) due to manipulation from malicious nodes, technological limitation (e.g., hardware and software errors), or due to environmental factors (e.g., sensors located in shadowing zone) [38]. As these attacks are unintentional, some measures need to be incorporated in the detection mechanism to ensure that these non-malicious nodes are not misdetected as malicious [45].…”
Section: Types Of Attacksmentioning
confidence: 99%
See 3 more Smart Citations