Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
143 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques (1405.2685v1)

Published 12 May 2014 in cs.NI

Abstract: In cognitive radio it is of prime importance that the presence of Primary Users (PU) is detected correctly at each of the time. In order to do so the help from all present Secondary Users (SU) is taken and such a taken is known as co-operative spectrum sensing. Ideally it is assumed that all the secondary users give the correct result to the control center. But there are certain conditions under which the secondary users deliberately forward wrong result to the control center so as to degrade the performance of the cognitive network. In this paper we study the different techniques for detecting the malicious users or outliers. We take into consideration practical environmental condition such that the received signal of the secondary users is made to undergo fading and noise is also introduced in the signal. We further go on to examine each of the outlier detector techniques and find out the most suitable at various instants.

Citations (1)

Summary

We haven't generated a summary for this paper yet.