2017
DOI: 10.3390/fi9040079
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Cognitive User Identification Algorithm in Centralized Spectrum Sensing System

Abstract: Collaborative spectral sensing can fuse the perceived results of multiple cognitive users, and thus will improve the accuracy of perceived results. However, the multi-source features of the perceived results result in security problems in the system. When there is a high probability of a malicious user attack, the traditional algorithm can correctly identify the malicious users. However, when the probability of attack by malicious users is reduced, it is almost impossible to use the traditional algorithm to co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…When emulating a PU, a malicious entity can reduce the availability of spectrum for SUs. The misbehaving nodes can be categorized as [19,[30][31][32][33][34][35] -Selfish nodes: They seek to maximize their own gains at the expense of others. -Malicious nodes: They act to degrade the system or individual node performance with no explicit intention to maximize their own gains and act as a PU and transmit false information to the SU.…”
Section: Threats On Crnmentioning
confidence: 99%
See 2 more Smart Citations
“…When emulating a PU, a malicious entity can reduce the availability of spectrum for SUs. The misbehaving nodes can be categorized as [19,[30][31][32][33][34][35] -Selfish nodes: They seek to maximize their own gains at the expense of others. -Malicious nodes: They act to degrade the system or individual node performance with no explicit intention to maximize their own gains and act as a PU and transmit false information to the SU.…”
Section: Threats On Crnmentioning
confidence: 99%
“…An attack is considered strong if it involves a minimal number of adversaries performing minimal operations but causing maximum damage or loss to the PUs and or SUs in the network. A brief summary of these attacks is given in Table 1 [19,[30][31][32][33][34][35][36][37][38][39][40][41][42]. Table 1.…”
Section: Threats On Crnmentioning
confidence: 99%
See 1 more Smart Citation
“…The latter feature is available to users who sign up for biometry usage. Biometry saves the user the stress of regular logins into gadgets and wares (e.g., keys or cards) with privacy and identity theft challenges [8]. For instance, lost or forgotten login details can be accessed by a third party and be used illegally.…”
Section: Introductionmentioning
confidence: 99%
“…Constructed wetland (CW) has been proven as a promising technology to treat wastewater pollution, and it has been successfully applied to secondary processing treatments of domestic sewage, leachate, rainfall runoff, and industrial effluent [1,2]. The regular CW is constructed by artificially constructing a pool or a grooved structure, filling in a certain depth of the filler layer, planting aquatic plants, and purifying the sewage by using the triple synergy of the physical, chemical and biological aspects of the substrate, plants and microorganisms.…”
Section: Introductionmentioning
confidence: 99%