2022
DOI: 10.1007/s11235-022-00896-0
|View full text |Cite
|
Sign up to set email alerts
|

Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…In Reference 11, Fu and He introduced a Bayesian‐inference‐based sliding‐window trust model to efficiently detect and remove independent and collaborative probabilistic SSDF attackers, even without any knowledge of the attack patterns. In addition, Miao et al 12 proposed a spectrum sensing strategy to employ weighted combining of the hidden Markov model. In References 13–15, the authors tried to defend large‐scale attacks with the help of trusted SU.…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…In Reference 11, Fu and He introduced a Bayesian‐inference‐based sliding‐window trust model to efficiently detect and remove independent and collaborative probabilistic SSDF attackers, even without any knowledge of the attack patterns. In addition, Miao et al 12 proposed a spectrum sensing strategy to employ weighted combining of the hidden Markov model. In References 13–15, the authors tried to defend large‐scale attacks with the help of trusted SU.…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…On basis of the weighted combination of the hidden Markov model, a CSS strategy against SSDF attack was proposed in the internet of thing. 12 In reference 13, a secure estimation secure diffusion least-mean-square algorithm against both Byzantine and manipulation attack was proposed. A modified outlier removal spectrum sensing scheme was proposed to conditionally remove outlier in reference 14.…”
Section: Related Work and Our Contributionsmentioning
confidence: 99%
“…In reference 11, based on a soft combining, a butterfly optimization algorithm was proposed to find an optimal weight coefficient vector against Byzantine attack. On basis of the weighted combination of the hidden Markov model, a CSS strategy against SSDF attack was proposed in the internet of thing 12 . In reference 13, a secure estimation secure diffusion least‐mean‐square algorithm against both Byzantine and manipulation attack was proposed.…”
Section: Introductionmentioning
confidence: 99%