Byzantine attack and defense in cognitive radio networks: A survey

L Zhang, G Ding, Q Wu, Y Zou, Z Han… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …

Energy-efficient cooperative spectrum sensing: A survey

K Cichoń, A Kliks, H Bogucka - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
The article analyzes the problem of energy efficient techniques in cooperative spectrum
sensing (CSS). Although it was proven that single-device sensing is not sufficient for reliable …

Finite block-length analysis of spectrum sharing networks using rate adaptation

B Makki, T Svensson, M Zorzi - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper studies the throughput of spectrum sharing networks utilizing rate adaptation. We
use some recent results on the achievable rates of finite block-length codes to analyze the …

A trust-evaluation-enhanced blockchain-secured industrial IoT system

D Wu, N Ansari - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT), allowing direct wireless communications between
industrial machines and people, is the key component of Industry 4.0. By grouping several …

Robust reputation-based cooperative spectrum sensing via imperfect common control channel

L Ma, Y Xiang, Q Pei, Y Xiang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Due to the fast-growing usage of wireless devices, cognitive radio networks have been
proposed to address the spectrum scarcity problem. As the foundation of their practical …

Thwarting intelligent malicious behaviors in cooperative spectrum sensing

W Wang, L Chen, KG Shin… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive
radio networks. Intelligent malicious users (IMUs) adjust their malicious behaviors according …

Binary hypothesis testing with byzantine sensors: Fundamental tradeoff between security and efficiency

X Ren, J Yan, Y Mo - IEEE Transactions on Signal Processing, 2018 - ieeexplore.ieee.org
This paper studies binary hypothesis testing based on measurements from a set of sensors,
a subset of which can be compromised by an attacker. The measurements from a …

Exploiting Trust for Resilient Hypothesis Testing withMalicious Robots

M Cavorsi, OE Akgün, M Yemini… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
We develop a resilient binary hypothesis testing framework for decision making in
adversarial multi-robot crowdsensing tasks. This framework exploits stochastic trust …

A survey on security issues in cognitive radio based cooperative sensing

S Shrivastava, A Rajesh, PK Bora, B Chen… - IET …, 2021 - Wiley Online Library
Cognitive radio based cooperative spectrum sensing (CSS) is severely affected when some
secondary users maliciously attack it. Two attacks regarded as key adversaries to the …

Cybersecurity behaviours of the employees and students at the Estonian Academy of Security Sciences

KR Kont - … Cybersecurity Journal: Practice, Process and People, 2024 - emerald.com
Purpose The purpose of this study is to identify the most common characteristics that make
Internet users at the Estonian Academy of Security Sciences (SKA) vulnerable to various …