2016
DOI: 10.1016/j.jnca.2016.06.007
|View full text |Cite
|
Sign up to set email alerts
|

Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks

Abstract: Cognitive radio ad hoc networks are commonly perceived as ideal ad hoc environments where cognitive radio technology enables secondary users (SUs) to utilize scarce spectrum resources in a dynamic manner. Cooperative spectrum sensing (CSS) is the key function of cognitive radio technology to identify the available spectrum. However, the nature of aggregating data makes CSS offer opportunities for malicious SUs. Recently, a lot of efforts have been paid to combating spectrum sensing data falsification (SSDF) th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Maintain the matrix; (5) else set the corresponding row vector to zero; (6) end if (7) end for (8) Then the current matrix T 1 is derived; (9) Evaluate the crowdsensing effect function of this particle; (10) Obtainthis particle's P id (matrix T 2 ) based on crowdsensing effect function; (11) Obtain (matrix T 3 ) with the optimal ; (12) Merge matrix T 1 , T 2 , T 3 ; (13) Optimize the column vectors of the merging matrix; (14) Optimize row vectors of the merging matrix with specific probability using (9); (15) Evaluate the crowdsensing effect function of merging matrix according to (6); ( on (1). This function reflects the sensing effect and its value is between 0 and 1.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Maintain the matrix; (5) else set the corresponding row vector to zero; (6) end if (7) end for (8) Then the current matrix T 1 is derived; (9) Evaluate the crowdsensing effect function of this particle; (10) Obtainthis particle's P id (matrix T 2 ) based on crowdsensing effect function; (11) Obtain (matrix T 3 ) with the optimal ; (12) Merge matrix T 1 , T 2 , T 3 ; (13) Optimize the column vectors of the merging matrix; (14) Optimize row vectors of the merging matrix with specific probability using (9); (15) Evaluate the crowdsensing effect function of merging matrix according to (6); ( on (1). This function reflects the sensing effect and its value is between 0 and 1.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…According to the sensing results, they estimate the spectrum states cooperatively [5]. In [6], authors propose a two-level defense scheme to solve the attackers in cooperative spectrum sensing. In [7], cooperative spectrum sensing based on crowdsourcing is studied to address the security issue brought by malicious mobile users.…”
Section: Related Workmentioning
confidence: 99%
“…Cognitive radio network is vulnerable to attacks [12] in which primary user emulation attack is one of the major security threats. Along with security, an iterative resource allocation process is used in the literature [13] to improve cognitive radio network performance through energy management.…”
Section: Related Workmentioning
confidence: 99%
“…In the wideband wireless system, the users exchange compression results (CS -compressive sensing). In [6] the authors assume the two-level protection scheme against interference in the cooperated spectrum analysis. In [7] it is considered the mutual spectrum analysis based on multiple detection with the aim of increasing the protection ratio level.…”
Section: Introductionmentioning
confidence: 99%