I. Introduction
To enhance the efficiency of spectrum utilisation and resolve the spectrum under-utilization problem, the concept of cognitive radio [1] was invented by J. Mitola, III which allows the Secondary Users (SUs) to share the spectrum with the Primary Users (PUs). One of the most important feature in cognitive radio network is the spectrum sensing which decides the channel availability. In literature, many spectrum sensing techniques are implemented such as the energy detection [2], cyclo-stationary based detection [3], matched filter [4], etc. However, the presence of malicious users can degrade the network performance by affecting the spectrum sensing. In the Spectrum Sensing Data Falsification (SSDF) attack [5], the malicious users launch harmful attacks [6] intentionally or unintentionally (hardware or software failure, shadowing problems, etc). In the cooperative spectrum sensing, the malicious users aims to affect the final decision taken by the Data Fusion Center (DFC) by reporting faulty spectrum detections. The major malicious users intention is to deprive selfishly the SUs from accessing to the white space (available channel).