2018
DOI: 10.1049/iet-wss.2016.0065
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight cloned‐node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs

Abstract: Cognitive Wireless Sensor Networks (CWSNs) provide better bandwidth utilization when compared with normal wireless sensor networks. CWSNs use a technique called opportunistic spectrum access for data transfer. While doing so, however, CWSNs are subject to several security threats. The spectrum sensing data falsification attack comes under the DoS attack. In this attack, a malicious node sends a modified spectrum sensing report so that the resulting collaborative spectrum sensing decision becomes wrong and a go… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…From the attacker's point of view, SSDF attack strategies can be divided into Always-Yes attack, Always-No attack, Always-False attack, Hit-and-Run attack, probability attack, and so on. 11 To deal with the serious damage on the reliability of CSS through data falsification injection, several works have been investigated to defense against SSDF attacks. The statistical features of node's sensing results can be employed to identify MUs.…”
Section: Related Workmentioning
confidence: 99%
“…From the attacker's point of view, SSDF attack strategies can be divided into Always-Yes attack, Always-No attack, Always-False attack, Hit-and-Run attack, probability attack, and so on. 11 To deal with the serious damage on the reliability of CSS through data falsification injection, several works have been investigated to defense against SSDF attacks. The statistical features of node's sensing results can be employed to identify MUs.…”
Section: Related Workmentioning
confidence: 99%
“…Pinaki Sankar Chatterjee et al [295] proposed a lightweight algorithm to detect the clone nodes in Cognitive Wireless Sensor Networks (CWSN). In this system, for every specified time interval, LEACH protocol elects the Cluster Head (CH), and that acts as a Monitoring Node (MN).…”
Section: ) Node Replication Attacksmentioning
confidence: 99%
“…Although plenty of the literature and comprehensive research on SSDF attack and defense has been made, most of them will be not specifically suited for CWSNs [23,24]. Basically, the reason is that the framework of resourceconstrained sensor nodes are not be considered, especially in aspect of the limitation of processing capacity and battery power.…”
Section: Related Workmentioning
confidence: 99%