{"title":"认知无线网络中SSDF攻击下软数据融合方案综合性能分析","authors":"Bouzegag Younes, Teguig Djamal, Maali Abdelmadjid","doi":"10.2174/2210327912666220325155048","DOIUrl":null,"url":null,"abstract":"\n\nTrust and security are the biggest challenges facing the Cooperative Spectrum Sensing (CSS) process in Cognitive Radio Networks (CRNs). The Spectrum Sensing Data Falsification (SSDF) attack is viewed as the biggest threat menacing CSS.\n\n\n\nThis paper investigates the performance of different soft data combining rules such as Maximal Ratio Combining (MRC), Square Law Selection (SLS), Square Law Combining (SLC), and Selection Combining (SC), in the presence of Always Yes and Always No Malicious User (AYMU and ANMU).\n\n\n\nMore precisely, a comparative study is conducted to assess the impact of such malicious users on the reliability of various soft data fusion schemes in terms of miss detection and false alarm probabilities. Furthermore, computer simulations are carried out to show that the soft data fusion scheme using MRC is the best among soft data combining.\n\n\n\nOn the other hand, ANMU has a slight impact on CSS, however, AYMU degrades severely the cooperative detection performance.\n","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"134 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comprehensive Performance Analysis of Soft Data Fusion Schemes Under SSDF Attacks in Cognitive Radio Networks\",\"authors\":\"Bouzegag Younes, Teguig Djamal, Maali Abdelmadjid\",\"doi\":\"10.2174/2210327912666220325155048\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n\\nTrust and security are the biggest challenges facing the Cooperative Spectrum Sensing (CSS) process in Cognitive Radio Networks (CRNs). The Spectrum Sensing Data Falsification (SSDF) attack is viewed as the biggest threat menacing CSS.\\n\\n\\n\\nThis paper investigates the performance of different soft data combining rules such as Maximal Ratio Combining (MRC), Square Law Selection (SLS), Square Law Combining (SLC), and Selection Combining (SC), in the presence of Always Yes and Always No Malicious User (AYMU and ANMU).\\n\\n\\n\\nMore precisely, a comparative study is conducted to assess the impact of such malicious users on the reliability of various soft data fusion schemes in terms of miss detection and false alarm probabilities. Furthermore, computer simulations are carried out to show that the soft data fusion scheme using MRC is the best among soft data combining.\\n\\n\\n\\nOn the other hand, ANMU has a slight impact on CSS, however, AYMU degrades severely the cooperative detection performance.\\n\",\"PeriodicalId\":37686,\"journal\":{\"name\":\"International Journal of Sensors, Wireless Communications and Control\",\"volume\":\"134 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Sensors, Wireless Communications and Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2174/2210327912666220325155048\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Sensors, Wireless Communications and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/2210327912666220325155048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Mathematics","Score":null,"Total":0}
Comprehensive Performance Analysis of Soft Data Fusion Schemes Under SSDF Attacks in Cognitive Radio Networks
Trust and security are the biggest challenges facing the Cooperative Spectrum Sensing (CSS) process in Cognitive Radio Networks (CRNs). The Spectrum Sensing Data Falsification (SSDF) attack is viewed as the biggest threat menacing CSS.
This paper investigates the performance of different soft data combining rules such as Maximal Ratio Combining (MRC), Square Law Selection (SLS), Square Law Combining (SLC), and Selection Combining (SC), in the presence of Always Yes and Always No Malicious User (AYMU and ANMU).
More precisely, a comparative study is conducted to assess the impact of such malicious users on the reliability of various soft data fusion schemes in terms of miss detection and false alarm probabilities. Furthermore, computer simulations are carried out to show that the soft data fusion scheme using MRC is the best among soft data combining.
On the other hand, ANMU has a slight impact on CSS, however, AYMU degrades severely the cooperative detection performance.
期刊介绍:
International Journal of Sensors, Wireless Communications and Control publishes timely research articles, full-length/ mini reviews and communications on these three strongly related areas, with emphasis on networked control systems whose sensors are interconnected via wireless communication networks. The emergence of high speed wireless network technologies allows a cluster of devices to be linked together economically to form a distributed system. Wireless communication is playing an increasingly important role in such distributed systems. Transmitting sensor measurements and control commands over wireless links allows rapid deployment, flexible installation, fully mobile operation and prevents the cable wear and tear problem in industrial automation, healthcare and environmental assessment. Wireless networked systems has raised and continues to raise fundamental challenges in the fields of science, engineering and industrial applications, hence, more new modelling techniques, problem formulations and solutions are required.