Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/57282
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jin, Fan | en |
dc.contributor.author | Varadharajan, Vijay | en |
dc.contributor.author | Tupakula, Udaya | en |
dc.date.accessioned | 2024-01-11T23:30:13Z | - |
dc.date.available | 2024-01-11T23:30:13Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Proceedings: the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, the 11th IEEE International Conference on Big Data Science and Engineering, the 14th IEEE International Conference on Embedded Software and Systems, p. 1096-1102 | en |
dc.identifier.isbn | 9781509049066 | en |
dc.identifier.isbn | 9781509049059 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/57282 | - |
dc.description.abstract | <p>Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. The sensing reports from all the CR nodes are sent to a Fusion Centre (FC) which aggregates these reports and takes decision about the presence of the PU, based on some decision rules. Such a collaborative sensing mechanism forms the foundation of any centralised CRN. However, this collaborative sensing mechanism provides more opportunities for malicious users (MUs) hiding in the legal users to launch spectrum sensing data falsification (SSDF) attacks. In an SSDF attack, some malicious users intentionally report incorrect local sensing results to the FC and disrupt the global decision-making process. To mitigate SSDF attacks, an Eclat algorithm based detection strategy is proposed in this paper for finding out the colluding malicious nodes. Simulation results show that the sensing performance of the scheme is better than the traditional majority based voting decision in the presence of SSDF attacks.<p> | en |
dc.language | en | en |
dc.publisher | Institute of Electrical and Electronics Engineers | en |
dc.relation.ispartof | Proceedings: the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, the 11th IEEE International Conference on Big Data Science and Engineering, the 14th IEEE International Conference on Embedded Software and Systems | en |
dc.title | An Eclat algorithm based energy detection for cognitive radio networks | en |
dc.type | Conference Publication | en |
dc.relation.conference | 2017 IEEE Trustcom/BigDataSE/ICESS | en |
dc.identifier.doi | 10.1109/Trustcom/BigDataSE/ICESS.2017.358 | en |
local.contributor.firstname | Fan | en |
local.contributor.firstname | Vijay | en |
local.contributor.firstname | Udaya | en |
local.profile.school | School of Science & Technology | en |
local.profile.email | utupakul@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.date.conference | 1st-4th August, 2017 | en |
local.conference.place | Sydney, Australia | en |
local.publisher.place | United States of America | en |
local.format.startpage | 1096 | en |
local.format.endpage | 1102 | en |
local.contributor.lastname | Jin | en |
local.contributor.lastname | Varadharajan | en |
local.contributor.lastname | Tupakula | en |
dc.identifier.staff | une-id:utupakul | en |
local.profile.orcid | 0000-0001-5048-9797 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/57282 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | An Eclat algorithm based energy detection for cognitive radio networks | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.conference.details | 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, 1st-4th August, 2017 | en |
local.search.author | Jin, Fan | en |
local.search.author | Varadharajan, Vijay | en |
local.search.author | Tupakula, Udaya | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2017 | en |
local.subject.for2020 | 460407 System and network security | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Conference Publication School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
SCOPUSTM
Citations
1
checked on Jul 6, 2024
Page view(s)
334
checked on Jun 30, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.