2020
DOI: 10.1049/iet-com.2019.0696
|View full text |Cite
|
Sign up to set email alerts
|

Reuse of Byzantine data in cooperative spectrum sensing using sequential detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…In details, in Reference [9], Zhu et al propose fuzzy weights to assign a weight based on the certainty of the report submitted by SUs and reduce the harm of uncertain reports. In References [10][11][12], Wu et al solve the problem of unreliable global decision and greatly improve the cooperative efficiency by means of reusing malicious reports and delivery-based evaluation. Alkheir et al study the relationship between the reporting time required for sequential reporting in Reference [13].…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…In details, in Reference [9], Zhu et al propose fuzzy weights to assign a weight based on the certainty of the report submitted by SUs and reduce the harm of uncertain reports. In References [10][11][12], Wu et al solve the problem of unreliable global decision and greatly improve the cooperative efficiency by means of reusing malicious reports and delivery-based evaluation. Alkheir et al study the relationship between the reporting time required for sequential reporting in Reference [13].…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…In Reference 29, Sharma et al implemented the novel functional encryption technique in the proposed UAV assisted heterogeneous network model for the dense urban area to secure data against different kinds of active and passive attacks such as spoofing, masquerading, impersonating. Motivated by the sequential method, Wu et al proposed sequential CSS to defend against Byzantine attack and reduce the number of samples in support of the accurate decision about the PU status in References 30‐32.…”
Section: Introductionmentioning
confidence: 99%
“…Though the CSS of UAVs have been extensively 22‐24 , the detection delay for the PU is also taken into consideration for CSS in References 25‐29, and the sequential method is used to improve the CSS security and efficiency in References 31‐33, all of the existing methods mentioned above possess respective limitations, such as, how to solve the cooperative mode of spatially located UAVs, what kind of truncation way is adopted in sequential CSS to ensure the sensing performance and throughput, especially under the sensing delay limit. Therefore, designing a quick CSS for CUAVNs still faces a huge challenge.…”
Section: Introductionmentioning
confidence: 99%
“…[13][14][15] propose to remove MSUs from the progress of cooperation or to eliminate the destructive influence caused by MSUs. The most popular mechanism for defense against SSDF attacks is the reputation based algorithm [16,17] , where the results of cognitive nodes are compared with the predefined reference and then their reputation values are counted accordingly. On basis of different references, existing reputation based works can be categorized into four classes.…”
Section: Introductionmentioning
confidence: 99%