2021
DOI: 10.1007/s11277-021-09402-2
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Optimized Secure Cooperative Spectrum Sensing for Cognitive Radio Networks

Abstract: Spectrum utilization is an important factor in Cognitive radio networks, which is accomplished by analyzing the unused spectrum bands of primary users (PU). The secondary users are allowed to access the resources, when the spectral bands are vacant by sensing the spectrum status and thus it reduces the spectrum scarcity among the users. Researchers have paid more attention towards spectrum sensing along with its security factors in cognitive radio networks. In this process, cooperative spectrum sensing is wide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Although the advantages of CSS in spatial diversity mitigate the impact of hidden terminals, the presence of MU still greatly reduces the sensing performance [7,8]. This paper uses the trust value update algorithm of regional autonomy, and the sensing flow chart is shown in Figure 2.…”
Section: Btracss Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Although the advantages of CSS in spatial diversity mitigate the impact of hidden terminals, the presence of MU still greatly reduces the sensing performance [7,8]. This paper uses the trust value update algorithm of regional autonomy, and the sensing flow chart is shown in Figure 2.…”
Section: Btracss Modelmentioning
confidence: 99%
“…The CSS can be classified into centralized, distributed, and relay based on the interaction modes between the users. However, CSS also brings some new security issues, such as PU emulation attacks [6], spectrum sensing data falsification (SSDF) attacks [7,8], channel blocking attacks [9] etc., which greatly reduce the performance of CSS.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A hierarchical cat and mouse learning machine was proposed to minimize Byzantine attack in reference 19. In reference 20, an ant colony optimization and differential evolution model was used to secure CSS against attack in CRNs. A support vector machine was used to learn the malicious behavior and identify malicious users in references 21,22.…”
Section: Introductionmentioning
confidence: 99%