2022 2nd International Conference on Intelligent Technologies (CONIT) 2022
DOI: 10.1109/conit55038.2022.9848274
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based Attack Detection under Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…In Reference 25, Vuppula and Pradhan proposed the integration of blockchain technology into CR systems to secure CSS, but the blockchain is time and energy‐consuming. In References 26–29, the authors used the node information and path information in distributed sensing and the consensus‐based credit value calculation method to modify the data of MUs. The above research greatly improves the security under distributed CSS.…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…In Reference 25, Vuppula and Pradhan proposed the integration of blockchain technology into CR systems to secure CSS, but the blockchain is time and energy‐consuming. In References 26–29, the authors used the node information and path information in distributed sensing and the consensus‐based credit value calculation method to modify the data of MUs. The above research greatly improves the security under distributed CSS.…”
Section: Motivation and Contributionmentioning
confidence: 99%