Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks

R Wan, L Ding, N **ong, X Zhou - International Journal of …, 2019 - journals.sagepub.com
To detect the primary user's activity accurately in cognitive radio sensor networks,
cooperative spectrum sensing is recommended to improve the sensing performance and the …

Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things

L Miao, X Di, ZM Huo, ZX Sun - Telecommunication Systems, 2022 - Springer
Abstract The Internet of Things (IoT) is a new paradigm for connecting various
heterogeneous networks. Cognitive radio (CR) adopts cooperative spectrum sensing (CSS) …

An enhanced cooperative spectrum sensing scheme against SSDF attack based on Dempster-Shafer evidence theory for cognitive wireless sensor networks

D Yao, S Yuan, Z Lv, D Wan, W Mao - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the potential applicability of spectrum sensing, cognitive wireless sensor networks
have attracted plenty of interest in the research community to improve the bandwidth …

The detection of the spectrum sensing data falsification attack in cognitive radio ad hoc networks

I Ngomane, M Velempini… - 2018 Conference on …, 2018 - ieeexplore.ieee.org
Cognitive radio technology addresses the spectrum scarcity challenges by allowing
unlicensed cognitive devices to opportunistically utilize spectrum band allocated to licensed …

Systematic survey on SSDF attack and detection mechanism in cognitive wireless sensor network

PS Chatterjee - 2021 International Conference on Intelligent …, 2021 - ieeexplore.ieee.org
Cognitive Wireless Sensor Network (CWSN) uses the spectrum wisely in comparison to a
traditional Wireless Sensor Network (WSN). The technique which enables Cognitive …

A novel machine learning pipeline to detect malicious anomalies for the Internet of Things

RM Shukla, S Sengupta - Internet of Things, 2022 - Elsevier
Anomaly detection is an imperative problem in the field of the Internet of Things (IoT). The
anomalies are considered as samples that do not follow a normal pattern and significantly …

Using a UNPCC based classification algorithm for detection of PUE attackers in cognitive wireless sensor networks

PS Chatterjee, M Roy - 2017 IEEE International Conference on …, 2017 - ieeexplore.ieee.org
Primary User Emulation (PUE) attack is a type of Denial of Service (DoS) attack in Cognitive
Wireless Sensor Network (CWSNs), where malicious secondary users (SU) try to emulate …

Detecting PUE attack by measuring aberrational node behavior in CWSN

PS Chatterjee, M Roy - Journal of Interconnection Networks, 2018 - World Scientific
Primary User Emulation (PUE) attack is a type of Denial of Service (DoS) attack in Cognitive
Wireless Sensor Network (CWSN), where malicious secondary users (SU) try to emulate …

Application of Random Forest Classifier for Prevention and Detection of Distributed Denial of Service Attacks

S Das, Z Dayam, PS Chatterjee - 2022 OITS International …, 2022 - ieeexplore.ieee.org
A classification issue in machine learning is the issue of spotting Distributed Denial of
Service (DDos) attacks. A Denial of Service (DoS) assault is essentially a deliberate attack …