2018 Conference on Information Communications Technology and Society (ICTAS) 2018
DOI: 10.1109/ictas.2018.8368742
|View full text |Cite
|
Sign up to set email alerts
|

The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…In [24] and with the aid of the Thompson sampling technique, an online primary user emulation attack was investigated. In [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], novel algorithms were proposed by considering the energy efficiency, spectrum maintenance, bandwidth guaranteeing, robustness, complexity, deep-learning hardware/software, probabilisticity, secure fusion strategies, specific channel models e.g. Nakagami-m fading etc.…”
Section: A Related Workmentioning
confidence: 99%
“…In [24] and with the aid of the Thompson sampling technique, an online primary user emulation attack was investigated. In [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], novel algorithms were proposed by considering the energy efficiency, spectrum maintenance, bandwidth guaranteeing, robustness, complexity, deep-learning hardware/software, probabilisticity, secure fusion strategies, specific channel models e.g. Nakagami-m fading etc.…”
Section: A Related Workmentioning
confidence: 99%
“…Cyber threats including such jamming [2] and GPS spoofing makes 5G, like all other networks, vulnerable [3,4]. Cognitive radio can render these risk taking to new attacks [5][6][7][8], such as main customer emulation [5] and data falsification through spectrum sensing [6]. As a result, it's crucial to understand the cyber security effects of 5Mobile communications [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Like the existing networks, 5G is vulnerable to the cyber security attacks, including jamming [2] and GPS spoofing [3,4]. It will be enabled by cognitive radio, making these networks open to new attacks, including primary user emulation attacks [5] and spectrum sensing data falsification [6]. Thus, it is important to explore the cybersecurity implications of 5G systems [7,8].…”
Section: Introductionmentioning
confidence: 99%