2010
DOI: 10.1109/twc.2010.061510.090395
|View full text |Cite
|
Sign up to set email alerts
|

Malicious User Detection in a Cognitive Radio Cooperative Sensing System

Abstract: Reliable detection of primary users (PUs) is an important task for cognitive radio (CR) systems. Cooperation among a few spectrum sensors has been shown to offer significant gain in the performance of the CR spectrum-sensing system by countering the shadow-fading effects. We consider a parallel fusion network in which the sensors send their sensing information to an access point which makes the final decision regarding presence or absence of the PU signal. It has been shown in the literature that the presence … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
113
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 182 publications
(114 citation statements)
references
References 13 publications
(26 reference statements)
0
113
0
1
Order By: Relevance
“…To address the above issues, various secure CSS schemes have been proposed [5][6][7][8][9][10][11][12][13]. When simple attack patterns are adopted by only a few malicious users (MUs) in CRNs, the schemes presented in [5][6][7] can work well enough.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To address the above issues, various secure CSS schemes have been proposed [5][6][7][8][9][10][11][12][13]. When simple attack patterns are adopted by only a few malicious users (MUs) in CRNs, the schemes presented in [5][6][7] can work well enough.…”
Section: Introductionmentioning
confidence: 99%
“…When simple attack patterns are adopted by only a few malicious users (MUs) in CRNs, the schemes presented in [5][6][7] can work well enough. The concept of applying the trust and reputation model in CRNs has also attracted interest recently [8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…The third type of malicious users will send random values for sensing malfunctioning. This may increase the false alarm probability or decrease the detection probability [3]. These malicious user scenarios have posed significant challenges in the CSS networks, especially the last type one.…”
Section: Introductionmentioning
confidence: 99%
“…A robust outlier detection utilizing outlier factors and user spatial information was proposed to identify the "Always Yes" malicious users in [3]. In addition, an outlier detection scheme based on Dixon's test was proposed to detect the presence of malicious users which may randomly send true or false value of received energy to confuse the other SUs in [5].…”
Section: Introductionmentioning
confidence: 99%
“…The approach presented in [12] requires that the fusion centre have prior knowledge of the attackers policy, which is difficult to obtain in practice. Secure collaborative spectrum sensing based on outlier detection techniques has been proposed in [13], but assumes partial knowledge of incumbent user activity and proposed a malicious user detection scheme.…”
mentioning
confidence: 99%