{"title":"基于Dixon离群值检测的认知无线电网络协同频谱感知恶意用户抑制","authors":"S. Kalamkar, A. Banerjee, A. Roychowdhury","doi":"10.1109/NCC.2012.6176787","DOIUrl":null,"url":null,"abstract":"Cooperation among multiple secondary users improves the cognitive radio sensing system performance, but the presence of malicious secondary users may severely degrade the same. In this paper, we study the detection and elimination of such malicious users in a cooperative sensing system using Dixon's outlier test and compare its performance with Grubb's test and boxplot test. We have shown using receiver operating characteristics curves that Dixon's test outperforms Grubb's test and boxplot test for the case of a single malicious user. We also illustrate the limitations of Dixon's test for several malicious users using an example of two malicious users in a cooperative spectrum sensing setting for cognitive radio.","PeriodicalId":178278,"journal":{"name":"2012 National Conference on Communications (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"33","resultStr":"{\"title\":\"Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon's outlier detection method\",\"authors\":\"S. Kalamkar, A. Banerjee, A. Roychowdhury\",\"doi\":\"10.1109/NCC.2012.6176787\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cooperation among multiple secondary users improves the cognitive radio sensing system performance, but the presence of malicious secondary users may severely degrade the same. In this paper, we study the detection and elimination of such malicious users in a cooperative sensing system using Dixon's outlier test and compare its performance with Grubb's test and boxplot test. We have shown using receiver operating characteristics curves that Dixon's test outperforms Grubb's test and boxplot test for the case of a single malicious user. We also illustrate the limitations of Dixon's test for several malicious users using an example of two malicious users in a cooperative spectrum sensing setting for cognitive radio.\",\"PeriodicalId\":178278,\"journal\":{\"name\":\"2012 National Conference on Communications (NCC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"33\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 National Conference on Communications (NCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCC.2012.6176787\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 National Conference on Communications (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCC.2012.6176787","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon's outlier detection method
Cooperation among multiple secondary users improves the cognitive radio sensing system performance, but the presence of malicious secondary users may severely degrade the same. In this paper, we study the detection and elimination of such malicious users in a cooperative sensing system using Dixon's outlier test and compare its performance with Grubb's test and boxplot test. We have shown using receiver operating characteristics curves that Dixon's test outperforms Grubb's test and boxplot test for the case of a single malicious user. We also illustrate the limitations of Dixon's test for several malicious users using an example of two malicious users in a cooperative spectrum sensing setting for cognitive radio.