2014
DOI: 10.1049/iet-com.2013.0609
|View full text |Cite
|
Sign up to set email alerts
|

Sliding window Dixon's tests for malicious users’ suppression in a cooperative spectrum sensing system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Such an attack is similar to the false data injection attacks in smart grid cyber‐physical system . A number of mitigation strategies have been proposed, such as those reported in other works …”
Section: Introductionmentioning
confidence: 85%
See 1 more Smart Citation
“…Such an attack is similar to the false data injection attacks in smart grid cyber‐physical system . A number of mitigation strategies have been proposed, such as those reported in other works …”
Section: Introductionmentioning
confidence: 85%
“…22,23 A number of mitigation strategies have been proposed, such as those reported in other works. [24][25][26] In a PUE attack, an attacker transmits a signal with the same characteristic as the primary user signal, attempting to deceive secondary users and preventing them from accessing the available frequency spectrum. There are two typical types of attackers in such an attack, namely, a selfish attacker who seeks to maximize his/her own spectrum usage, and a malicious attacker seeking to deny secondary users from using available spectrums (ie, denial of service attacks).…”
mentioning
confidence: 99%
“…. , (5) if SU in at th sensing period, (6) = ∪ { , } 7end if (8) dim = dimension of (9) if dim ̸ = 0 (10) Avg ( ) = ∑ dim (11) else (12) Avg ( ) = 0 (13) end if (14) end for (15) using 25…”
Section: Evaluate the Average Of The Signal Strength Received Frommentioning
confidence: 99%
“…An SU with abnormal estimated parameters will be detected as malicious SU, and its reports will be filtered out. The authors in [14] propose applying the Dixon's test on the SUs' energy data to suppress a malicious secondary user (SU) in centralised fusion based CRNs. When the fusion center (FC) can obtain the location information of the SUs, another type of location based schemes has also been developed.…”
Section: Introductionmentioning
confidence: 99%
“…However, the limitation of the application of Dixon's test in [12] was its inefficiency in detecting multiple MUs in a CSS scheme. Further, in [13], \emph{Sliding Window Dixon's test (SW Dixon's test)} was proposed to overcome the limitations of [12]. The SW Dixon's test was found to be highly efficient in detecting multiple MUs.…”
Section: Introductionmentioning
confidence: 99%