2019
DOI: 10.1177/1550147719870645
|View full text |Cite|
|
Sign up to set email alerts
|

Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks

Abstract: To detect the primary user’s activity accurately in cognitive radio sensor networks, cooperative spectrum sensing is recommended to improve the sensing performance and the reliability of spectrum-sensing process. However, spectrum-sensing data falsification attack being launched by malicious users may lead to fatal mistake of global decision about spectrum availability at the fusion center. It is a tough task to mitigate the negative effect of spectrum-sensing data falsification attack and even eliminate these… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 31 publications
(26 reference statements)
0
15
0
Order By: Relevance
“…The prior knowledge of the user is needed in the implementation of the method. Furthermore, an adaptive reputation evaluation for individual and collaborative SSDF attackers based on a linear weighted combination scheme has been proposed by Wan et al [8]. Consistency measures are executed to detect outliers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The prior knowledge of the user is needed in the implementation of the method. Furthermore, an adaptive reputation evaluation for individual and collaborative SSDF attackers based on a linear weighted combination scheme has been proposed by Wan et al [8]. Consistency measures are executed to detect outliers.…”
Section: Related Workmentioning
confidence: 99%
“…where γ is the signal-to-noise ratio (SNR) of the received signal, and λ is the threshold, v is the product of time (T) and bandwidth (B), and Q u represents the marqum Q function. The cumulative probability of detection and false alarm at the FC are represented by Equations (8) and 9,…”
Section: System Modelmentioning
confidence: 99%
“…In random opposite MU (ROMU), the MU randomly sends the inverse of the local sensing result to the FC. To mitigate the effect of these attacks, several different schemes were proposed [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…Various attacks which severely degrade the performance of the CSS have been studied in the CRN. e representative attacks are Byzantine users' attack, jamming attack, and primary user emulation attack (PUEA) [29][30][31][32][33]. e Byzantine users' attack is a type of spectrum sensing data falsification (SSDF) attack, where malicious users (MUs) report false information to the FC.…”
mentioning
confidence: 99%
“…In [30], the authors isolated SSDF outliers by utilizing Z-test; the SSDF attack is mitigated via q-out-of-m scheme. Similarly, in [31], the authors utilized a linear-weighted combination scheme to eliminate the effect of the SSDF attack on the final sensing decision. Furthermore, an adaptive reputation evaluation mechanism is introduced to discriminate malicious users from legitimate users.…”
mentioning
confidence: 99%