• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

Current Result Document : 3 / 33 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective
¿µ¹®Á¦¸ñ(English Title) Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective
ÀúÀÚ(Author) Boya Yang   Wanli Peng   Yiming Xue   Ping Zhong   Wei Yang   Xiaojun Jing   Hai Huang   Chunsheng Zhu   Qiaojie Jiang   Dongliang Xie   Jipeng Gan   Jun Wu   Jia Zhang   Zehao Chen   Ze Chen  
¿ø¹®¼ö·Ïó(Citation) VOL 15 NO. 11 PP. 4224 ~ 4243 (2021. 11)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
Cognitive radio (CR) is a feasible intelligent technology and can be used as an effective solution to spectrum scarcity and underutilization. As the key function of CR, cooperative spectrum sensing (CSS) is able to effectively prevent the harmful interference with primary users (PUs) and identify the available spectrum resources by exploiting the spatial diversity of multiple secondary users (SUs). However, the open nature of the cognitive radio networks (CRNs) framework makes CSS face many security threats, such as, the malicious user (MU) launches Byzantine attack to undermine CRNs. For this aim, we make an in-depth analysis of the motive and purpose from the MU¡¯s perspective in the interweave CR system, aiming to provide the future guideline for defense strategies. First, we formulate a dynamic Byzantine attack model by analyzing Byzantine behaviors in the process of CSS. On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU. Moreover, the throughput and interference to the primary network are taken into consideration to evaluate the impact of Byzantine attack on the interweave CR system, and then analyze the optimal strategy of Byzantine attack when the fusion rule is known. Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.
Å°¿öµå(Keyword) Steganography   Steganalysis   Linguistic Steganography   Probability Distribution   Imperceptibility   Internet of Things   channel model   HAPS   cell capacity   quasi-stationary state   Cooperative spectrum sensing   Byzantine attack   Malicious perspective   Throughput and interference  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå