2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC) 2018
DOI: 10.1109/iconic.2018.8601087
|View full text |Cite
|
Sign up to set email alerts
|

The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Sequential detection [9][10][11][12][13][14][15][16][17][18][19] Consensus algorithm [20] Hamming distance [21] Dempster-Shafer evidence theory [22,25] Double adaptive threshold approach [23,24] Soft fusion [26] Beta function [27] Security and privacy [28,29] Green communication [30][31][32][33] Secure spectrum and energy efficiency [34] Game theory [35] Mobility management [36,37] Meanwhile, the reputation mechanism is also widely used to secure the CSS. Mapunya and Velempini propose a method to solve Byzantine attack by isolating the forged report data in Reference [20]. Based on the report history of all SUs, Liu et al calculate the cumulative level of suspiciousness and distinguish between honest users (HUs) and MUs.…”
Section: Methods and Research Directions Literaturementioning
confidence: 99%
See 2 more Smart Citations
“…Sequential detection [9][10][11][12][13][14][15][16][17][18][19] Consensus algorithm [20] Hamming distance [21] Dempster-Shafer evidence theory [22,25] Double adaptive threshold approach [23,24] Soft fusion [26] Beta function [27] Security and privacy [28,29] Green communication [30][31][32][33] Secure spectrum and energy efficiency [34] Game theory [35] Mobility management [36,37] Meanwhile, the reputation mechanism is also widely used to secure the CSS. Mapunya and Velempini propose a method to solve Byzantine attack by isolating the forged report data in Reference [20]. Based on the report history of all SUs, Liu et al calculate the cumulative level of suspiciousness and distinguish between honest users (HUs) and MUs.…”
Section: Methods and Research Directions Literaturementioning
confidence: 99%
“…According to (20), the ith SU's reporting results can be calculated into the likelihood ratio cumulative. It is precisely based on this situation that MUs will not be removed from CRNs in SSS but limited to access the channel through a specific spectrum resource allocation algorithm at the data transmission slot.…”
Section: Dynamic Reporting Waymentioning
confidence: 99%
See 1 more Smart Citation
“…The simulations aim to study the behavior and efficiency of the trust model under the Random-Byzantine Attack (RBZ) [19] where the adversary has full control of an authenticated device and can perform arbitrary behavior to disrupt the system. During the simulations, the mean reputation ratio is studied as the main metric to be compared between the public and private communities based on three variables: The number of attackers, the number of entities, and the time (interaction number).…”
Section: Simulation Setupmentioning
confidence: 99%
“…To improve the performance of CR receivers operating at low signal-to-noise ratio (SNR), H. Hsieh et al proposed a sequential test detector based on higher-order statistics for detecting underutilized spectrum in [8]. In [9], S. Mapunya and M. Velempini proposed an extreme studentized consensus CSS to combat the negative effect of greedy attacker. In [10], Y.…”
Section: Related Workmentioning
confidence: 99%