Repository logo
Communities & Collections
All of KYUSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Birabwa, Joanitah D."

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    Identification and punishment policies for spectrum sensing data falsification attackers using delivery-based assessment
    (IEEE Transactions on Vehicular Technology ., 2015-11) Althunibat, Saud; Birabwa, Joanitah D.; Granelli, Fabrizio
    Spectrum sensing data falsification (SSDF) attacks represent a major challenge for cooperative spectrum sensing (CSS) in cognitive radio (CR) networks. In an SSDF attack, a malicious user or many malicious users send false sensing results to the fusion center (FC) to mislead the global decision about spectrum occupancy. Thus, an SSDF attack degrades the achievable detection accuracy, throughput, and energy efficiency of CR networks (CRNs). In this paper, a novel attacker-identification algorithm is proposed that is able to skillfully detect attackers and reject their reported results. Moreover, we provide a novel attacker-punishment algorithm that aims at punishing attackers by lowering their individual energy efficiency, motivating them either to quit sending false results or leave the network. Both algorithms are based on a novel assessment strategy of the sensing performance of each user. The proposed strategy is called delivery-based assessment, which relies on the delivery of the transmitted data to evaluate the made global decision and the individual reports. Mathematical analysis and simulation results show promising performance of both algorithms compared with previous works, particularly when then the number of attackers is very large.

Kyambogo University copyright © 2025

  • Privacy policy
  • End User Agreement
  • Send Feedback