By Topic

Dynamic witness selection for trustworthy distributed cooperative sensing in cognitive radio networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Han Yu ; Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore, Singapore ; Siyuan Liu ; Kot, A.C. ; Chunyan Miao
more authors

Cooperative spectrum sensing by secondary user (SU) nodes in cognitive radio networks (CRNs) is a promising approach to increase the spectrum access efficiency and overall network performance. However, unreliable sensing results or malicious behaviors from cooperator SU nodes can be very disruptive and reduce the network performance. Trust and reputation modeling has been identified as one of the potential solutions to address this problem, but the current centralized trust evaluation approach in CRN lacks scalability. Although some decentralized trust models have been proposed in CRN, without proper protection mechanisms, they are vulnerable to collusive behaviors by the witness SU nodes when they share testimonies about the trustworthiness of neighboring SU nodes. In this paper, we propose a clustering based witness selection method to address this problem. By dividing the witness SU nodes testimonies about the trustworthiness of neighboring SU nodes into clusters, the proposed method helps SU nodes to select which witness's opinion to trust mode in the future. The proposed method has been studied using extensive computer simulation and has demonstrated good robustness against common collusive attacks.

Published in:

Communication Technology (ICCT), 2011 IEEE 13th International Conference on

Date of Conference:

25-28 Sept. 2011