2016 International Conference on Computer, Information and Telecommunication Systems (CITS) 2016
DOI: 10.1109/cits.2016.7546433
|View full text |Cite
|
Sign up to set email alerts
|

Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Sequential detection [9][10][11][12][13][14][15][16][17][18][19] Consensus algorithm [20] Hamming distance [21] Dempster-Shafer evidence theory [22,25] Double adaptive threshold approach [23,24] Soft fusion [26] Beta function [27] Security and privacy [28,29] Green communication [30][31][32][33] Secure spectrum and energy efficiency [34] Game theory [35] Mobility management [36,37] Meanwhile, the reputation mechanism is also widely used to secure the CSS. Mapunya and Velempini propose a method to solve Byzantine attack by isolating the forged report data in Reference [20].…”
Section: Methods and Research Directions Literaturementioning
confidence: 99%
See 2 more Smart Citations
“…Sequential detection [9][10][11][12][13][14][15][16][17][18][19] Consensus algorithm [20] Hamming distance [21] Dempster-Shafer evidence theory [22,25] Double adaptive threshold approach [23,24] Soft fusion [26] Beta function [27] Security and privacy [28,29] Green communication [30][31][32][33] Secure spectrum and energy efficiency [34] Game theory [35] Mobility management [36,37] Meanwhile, the reputation mechanism is also widely used to secure the CSS. Mapunya and Velempini propose a method to solve Byzantine attack by isolating the forged report data in Reference [20].…”
Section: Methods and Research Directions Literaturementioning
confidence: 99%
“…In the past, many efforts have been devoted to studying Byzantine identification and suppression algorithms, such as in References [9–37]. A comprehensive survey on secure CSS can be found in Table 1.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [29] have explored the interference power in the case of dynamic spectrum access in a cooperative communication scenario. The authors in [30] studied the location of the FC in a cooperative communication system, considering the different power allocations to make the FC location closer to dense clusters. In addition, the authors in [31,32] use adaptive PSO to solve the problem of sensor network power allocation and communication load for automation and Industry 4.0 applications.…”
Section: Related Workmentioning
confidence: 99%
“…In [11] a bilevel thresh holding approach for energy detection is proposed. In [12], an improved soft fusion-based algorithm was proposed. The authors made improvements in the traditional soft fusion algorithm by establishing the reputation mechanism according to the SU's past service qualities.…”
Section: Introductionmentioning
confidence: 99%