Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks

R Wan, L Ding, N Xiong, X Zhou - International Journal of …, 2019 - journals.sagepub.com
To detect the primary user's activity accurately in cognitive radio sensor networks,
cooperative spectrum sensing is recommended to improve the sensing performance and the …

Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things

L Miao, X Di, ZM Huo, ZX Sun - Telecommunication Systems, 2022 - Springer
Abstract The Internet of Things (IoT) is a new paradigm for connecting various
heterogeneous networks. Cognitive radio (CR) adopts cooperative spectrum sensing (CSS) …

An enhanced cooperative spectrum sensing scheme against SSDF attack based on Dempster-Shafer evidence theory for cognitive wireless sensor networks

D Yao, S Yuan, Z Lv, D Wan, W Mao - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the potential applicability of spectrum sensing, cognitive wireless sensor networks
have attracted plenty of interest in the research community to improve the bandwidth …

Lightweight cloned‐node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs

P Sankar Chatterjee, M Roy - IET wireless sensor systems, 2018 - Wiley Online Library
Cognitive Wireless Sensor Networks (CWSNs) provide better bandwidth utilization when
compared with normal wireless sensor networks. CWSNs use a technique called …

The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc networks

I Ngomane, M Velempini… - 2018 Conference on …, 2018 - ieeexplore.ieee.org
Cognitive radio technology addresses the spectrum scarcity challenges by allowing
unlicensed cognitive devices to opportunistically utilize spectrum band allocated to licensed …

Systematic survey on SSDF attack and detection mechanism in cognitive wireless sensor network

PS Chatterjee - 2021 International Conference on Intelligent …, 2021 - ieeexplore.ieee.org
Cognitive Wireless Sensor Network (CWSN) uses the spectrum wisely in comparison to a
traditional Wireless Sensor Network (WSN). The technique which enables Cognitive …

A novel machine learning pipeline to detect malicious anomalies for the Internet of Things

RM Shukla, S Sengupta - Internet of Things, 2022 - Elsevier
Anomaly detection is an imperative problem in the field of the Internet of Things (IoT). The
anomalies are considered as samples that do not follow a normal pattern and significantly …

Using a UNPCC based classification algorithm for detection of PUE attackers in cognitive wireless sensor networks

PS Chatterjee, M Roy - 2017 IEEE International Conference on …, 2017 - ieeexplore.ieee.org
Primary User Emulation (PUE) attack is a type of Denial of Service (DoS) attack in Cognitive
Wireless Sensor Network (CWSNs), where malicious secondary users (SU) try to emulate …

Detecting PUE attack by measuring aberrational node behavior in CWSN

PS Chatterjee, M Roy - Journal of Interconnection Networks, 2018 - World Scientific
Primary User Emulation (PUE) attack is a type of Denial of Service (DoS) attack in Cognitive
Wireless Sensor Network (CWSN), where malicious secondary users (SU) try to emulate …

[PDF][PDF] 分布式协作认知无线电SSDF 攻击的防御策略综述

卢光跃, 苏杭 - 电信科学, 2017 - infocomm-journal.com
协作频谱感知可以提高频谱感知的可靠性, 但其融合机制使得其易受频谱感知数据篡改(
spectrum sensing data falsification, SSDF) 攻击影响. 为深入了解SSDF 攻击防御算法的发展 …