An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks

被引:5
|
作者
Tephillah, S. [1 ]
Manickam, J. Martin Leo [2 ]
机构
[1] Anna Univ, St Josephs Inst Technol, St Josephs Grp Inst, Dept Elect & Commun, Chennai, Tamil Nadu, India
[2] Anna Univ, St Josephs Coll Engn, Dept Elect & Commun, St Josephs Grp Inst, Chennai, Tamil Nadu, India
来源
WIRELESS COMMUNICATIONS & MOBILE COMPUTING | 2020年 / 2020卷 / 2020期
关键词
MANAGEMENT; TRUST;
D O I
10.1155/2020/9047809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] ProMETHEUS: A Secure Lightweight Spectrum Allocation Protocol against SSDF Attacks in Cognitive Radio IoT Networks
    Patnaik, Milan
    Bharati, K.
    Matyas, Vashek
    IEEE COMMUNICATIONS LETTERS, 2023, 27 (11) : 2919 - 2923
  • [42] Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks
    Sucasas, Victor
    Althunibat, Saud
    Radwan, Ayman
    Marques, Hugo
    Rodriguez, Jonathan
    Vahid, Seiamak
    Tafazolli, Rahim
    Granelli, Fabrizio
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3978 - 3994
  • [43] Trust-based Cooperative Spectrum Sensing Against SSDF Attacks in Distributed Cognitive Radio Networks
    Wang, Ji
    Chen, Ing-Ray
    Tsai, Jeffrey J. P.
    Wang, Ding-Chau
    2016 IEEE INTERNATIONAL WORKSHOP TECHNICAL COMMITTEE ON COMMUNICATIONS QUALITY AND RELIABILITY (CQR), 2016, : 13 - 18
  • [44] Proof of Reputation: A Blockchain-Based Countermeasure to Defend Against Massive SSDF in Cognitive Radio Networks
    Yang, Ning
    Jiang, Hao
    Guo, Daoxing
    Liu, Yuan
    Ding, Guoru
    Chen, Zhen
    Yang, Zhaohui
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (11) : 2693 - 2697
  • [45] Enhanced Primary User Emulation Attack Inference in Cognitive Radio Networks Using Machine Learning Algorithm
    Sureka, N.
    Gunaseelan, K.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1893 - 1906
  • [46] An improved Primary User Emulation Attack Detection in Cognitive Radio Networks Based on Firefly Optimization Algorithm
    Ghanem, Walid R.
    Shokair, Mona
    Desouky, Moawad I.
    2016 33RD NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2016, : 178 - 187
  • [47] Distributed Cooperative Algorithm to Mitigate Hello Flood Attack in Cognitive Radio Ad hoc Networks (CRAHNs)
    Gupta, Anjali
    Hussain, Muzzammil
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 255 - 263
  • [48] Order statistics and recursive updating with aging factor for cooperative cognitive radio networks under SSDF attacks
    Lee, Seungwon
    Zhang, Yalei
    Yoon, Seokho
    Song, Iickho
    ICT EXPRESS, 2020, 6 (01): : 3 - 6
  • [49] A Proactive Elimination of Primary User Emulation Attack in Cognitive Radio Networks Using Intense Explore Algorithm
    Sumathi, A. C.
    Vidhyapriya, R.
    Kiruthika, C.
    2015 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2015,
  • [50] A Blind Matching Algorithm for Cognitive Radio Networks
    Hamza, Doha
    Shamma, Jeff S.
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2938 - 2942