2009
DOI: 10.1109/jcn.2009.6391387
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced robust cooperative spectrum sensing in cognitive radio

Abstract: As wireless spectrum resources become more scarce while some portions of frequency bands suffer from low utilization, the design of cognitive radio (CR) has recently been urged, which allows opportunistic usage of licensed bands for secondary users without interference with primary users. Spectrum sensing is fundamental for a secondary user to find a specific available spectrum hole. Cooperative spectrum sensing is more accurate and more widely used since it obtains helpful reports from nodes in different loca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(25 citation statements)
references
References 10 publications
0
25
0
Order By: Relevance
“…• Defense efficiency, which includes convergence rate [43] [44], defense cost [45], and computation complexity.…”
Section: Game Between the Byzantine Attack And Defensementioning
confidence: 99%
“…• Defense efficiency, which includes convergence rate [43] [44], defense cost [45], and computation complexity.…”
Section: Game Between the Byzantine Attack And Defensementioning
confidence: 99%
“…In the case of SSDF attacks, trust models have been effective at removing malicious sensors from the shared spectrum sensing [13][14][15][16][17]. However, these trust models cannot distinguish between malicious sensors and accurate sensors misled by rogue signals (as opposed to the legitimate primary signal).…”
Section: Rogue Signal Framing Intrusionmentioning
confidence: 99%
“…To counter SSDF, various trust models have been proposed to protect CCS from malicious SUs [13][14][15][16][17]. These trust-based CSS protocols build reputation profiles for sensors and filter out the sensing reports from those with low reputations.…”
Section: Introductionmentioning
confidence: 99%
“…IndTr kj (10) which reflects the interaction degree of target user compared with other users in the same sub-network.…”
Section: Activity Metric Of Cognitive Usermentioning
confidence: 99%
“…Most of the studies in security of CRN focus on spectrum sensing techniques, where the main contributions are attack defense based on attack detection. The existing achievement discussing detailed approaches for the detection and mitigation of specific attacks, such as by Subbalakshmi et al in [5][6][7][8] and other scholars, Chen et al in [3,9], Zhu et al in [10], Yu et al in [11], Wu et al in [12,13]. They all have made a great contribution in the CRN security areas, and their achievements will not be described here, as it is out of the scope of this paper.…”
Section: Introductionmentioning
confidence: 99%