2015
DOI: 10.1186/1687-1499-2015-4
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting and defending trust models in cooperative spectrum sensing

Abstract: Cognitive radios are currently presented as the solution to the ever-increasing spectrum shortage problem. However, their increased capabilities over traditional radios introduce a new dimension of security threats. Cooperative spectrum sensing (CSS) has been proposed as a means to protect cognitive radio networks from the well-known security threats: primary user emulation (PUE) and spectrum sensing data falsification (SSDF). In this paper, we demonstrate a new threat to CSS protocols that rely on sensor repu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Modified combinational identification algorithm has been discussed in [46] to mitigate the attacks in cooperative sensing. Cluster-based technique to overcome the rogue signal intrusion in cooperative spectrum sensing has been discussed in [47]. In [48], a novel method has been suggested to mitigate the threat in cooperative spectrum sensing.…”
Section: Pueamentioning
confidence: 99%
“…Modified combinational identification algorithm has been discussed in [46] to mitigate the attacks in cooperative sensing. Cluster-based technique to overcome the rogue signal intrusion in cooperative spectrum sensing has been discussed in [47]. In [48], a novel method has been suggested to mitigate the threat in cooperative spectrum sensing.…”
Section: Pueamentioning
confidence: 99%