Computer Science ›› 2021, Vol. 48 ›› Issue (2): 282-288.doi: 10.11896/jsjkx.191100124
• Information Security • Previous Articles Next Articles
DING Shi-ming1,2, WANG Tian-jing1, SHEN Hang1,2, BAI Guang-wei1
CLC Number:
[1] SASABE M,NISHIDA T,KASAHARA S.Collaborative spectrum sensing mechanism based on user incentive in cognitive radio networks[J].Computer Communications,2019,147(8):1-13. [2] SHRIVASTAVA S,RAJESH A,BORA P K.Defense against primary user emulation attacks from the secondary user throughput perspective[J].AEU-International Journal of Electronics and Communications,2018,84(2):131-143. [3] SHARMA G,SHARMA R.Performance comparison of hardand soft fusion Techniques for Energy Efficient CSS in Cognitive Radio[C]//2018 International Conference on Advanced Computation and Telecommunication (ICACAT).IEEE,2018:1-4. [4] SEO D,NAM H.A Parallel Multi-Channel Cooperative Spectrum Sensing in Cognitive Radio Networks[C]//2018 International Symposium on Antennas and Propagation (ISAP).IEEE,2018:1-2. [5] DU R,ZHOU Y,LIU F,et al.An effective collaborative spectrum sensing method against SSDF attack[C]//2017 29th Chinese Control and Decision Conference (CCDC).IEEE,2017:5698-5702. [6] DAS D,DAS S.An intelligent resource management scheme for SDF-based cooperative spectrum sensing in the presence of primary user emulation attack[J].Computers & Electrical Engineering,2018,69(7):555-571. [7] ZHANG L,DING G,WU Q,et al.Byzantine attack and defense in cognitive radio networks:A survey[J].IEEE Communications Surveys & Tutorials,2015,17(3):1342-1363. [8] PENG T,CHEN Y,XIAO J,et al.Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks[C]//2016 International Conference on Computer,Information and Telecommunication Systems (CITS).IEEE,2016:1-5. [9] ESLAMI A,KARAMZADEH S.Performance analysis of double threshold energy detection-based spectrum sensing in low SNRs over Nakagami-m fading channels with noise uncertainty[C]//2016 24th Signal Processing and Communication Application Conference (SIU).IEEE,2016:309-312. [10] LI L,LI F,ZHU J.A method to defense against cooperative SSDF attacks in Cognitive Radio Networks[C]//2013 IEEE International Conference on Signal Processing,Communication and Computing (ICSPCC 2013).IEEE,2013:1-6. [11] SUN Z,XU Z,HAMMAD M Z.Defending Against Massive SSDF Attacks from a Novel Perspective of Honest SecondaryUsers[J].IEEE Communications Letters,2019,23(10):1696-1699. [12] AL-MATHEHAJI Y,BOUSSAKTA S,JOHNSTON M,et al.Defeating SSDF attacks with trusted nodes assistance in cognitive radio networks[J].IEEE Sensors Letters,2017,1(4):1-4. [13] GHAZNAVI M,JAMSHIDI A.A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks[J].Computer Communications,2019,138(4):106-114. [14] YUE W J,ZHENG B Y,MENG Q M,et al.Robust cooperative spectrum sensing schemes for fading channels in cognitive radio networks[J].Science China Information Sciences,2011,54(2):348-359. [15] GUL N,QURESHI I M,NAVEED A,et al.Secured Soft Combination Schemes Against Malicious-Users in Cooperative Spectrum Sensing[J].Wireless Personal Communications,2019:1-20. [16] TANG H,YU F R,HUANG M,et al.Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks[J].IET communications,2012,6(8):974-983. [17] HUANG Q D,SUN Q,YAN Q Q.Communication spectrumsensing scheme based on median anti-SSDF attack[J].Journal of Xi'an University of Posts and Telecommunications,2017,22(2):12-17. [18] ZENG K,PAWELCZAK P,CABRIC D.Reputation-based coope-rative spectrum sensing with trusted nodes assistance[J].IEEE Communications Letters,2010,14(3):226-228. [19] LI F W,LIU F,ZHU J,et al.Reputation-based secure spectrum situation fusion in distributed cognitive radio networks[J].The Journal of China Universities of Posts and Telecommunications,2015,22(3):110-117. [20] WANG J,CHEN R,TSAI J J P,et al.Trust-based cooperative spectrum sensing against SSDF attacks in distributed cognitive radio networks[C]//2016 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR 2016).IEEE,2016:1-6. |
[1] | FENG Gui-lan and TAN Liang. Data Assured Deletion Scheme Based on Trust Value for Cloud Storage [J]. Computer Science, 2014, 41(6): 108-112. |
[2] | LIU Sha and TAN Liang. New Trust Based Access Control Model in Hadoop [J]. Computer Science, 2014, 41(5): 155-163. |
[3] | SHENG Yong,DU Xiao-jing,JIANG Li-ming,XU Jian. New Trust Metric Based on Fuzzy Adjustment for Services Computing Environment [J]. Computer Science, 2011, 38(Z10): 83-86. |
[4] | DENG Zhong-jun,WANG Shao-jie,ZHENG Xue-feng,SUO Yan-feng, YU Zhen. Multi-granularity Trust Model Based on Individual Expericence [J]. Computer Science, 2010, 37(4): 91-. |
[5] | YAO Xuan-xia,GHENG Xue-feng,ZHOU Fang. Efficient Secure Routing Scheme for Wireless Sensor Networks [J]. Computer Science, 2009, 36(7): 52-55. |
[6] | ZHOU Jin-Yang, YANG Shou-Bao, GUO Lei-Tao, WANG Li-Ping(Department of Computer Science, University of Science and Technology of China, Hefei 230026). [J]. Computer Science, 2005, 32(11): 27-30. |
|