Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey

V Sharma, I You, K Andersson, F Palmieri… - IEEE …, 2020 - ieeexplore.ieee.org
With an enormous range of applications, the Internet of Things (IoT) has magnetized
industries and academicians from everywhere. IoT facilitates operations through ubiquitous …

When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing

Z Luo, S Zhao, Z Lu, J Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Defense strategies have been well studied to combat Byzantine attacks that aim to disrupt
cooperative spectrum sensing by sending falsified versions of spectrum sensing data to a …

Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks

R Wan, L Ding, N Xiong, X Zhou - International Journal of …, 2019 - journals.sagepub.com
To detect the primary user's activity accurately in cognitive radio sensor networks,
cooperative spectrum sensing is recommended to improve the sensing performance and the …

Deep reinforcement learning based reliable spectrum sensing under SSDF attacks in cognitive radio networks

A Paul, AK Mishra, S Shreevastava… - Journal of Network and …, 2022 - Elsevier
Abstract In Spectrum Sensing Data Falsification (SSDF) attacks, malicious Secondary Users
(SUs) actively send erroneous local sensing results to the Fusion Centre (FC) that influence …

Joint spectrum sensing and D2D communications in Cognitive Radio Networks using clustering and deep learning strategies under SSDF attacks

A Paul, K Choi - Ad Hoc Networks, 2023 - Elsevier
Abstract In Spectrum Sensing and Data Falsification Attacks (SSDF), malicious Secondary
Users (SUs) in Cognitive Radio Networks (CRNs) intentionally try to disrupt the global …

MCTRP: an energy efficient tree routing protocol for vehicular ad hoc network using genetic whale optimization algorithm

U Mohanakrishnan, B Ramakrishnan - Wireless Personal Communications, 2020 - Springer
VANETs are wireless sensor networks that suffer from the drawback of highly mobile nodes.
The main objective of any type of network is to achieve efficient transmission goals. The …

Joint spectrum sensing and spectrum access for defending massive SSDF attacks: A novel defense framework

Z Xu, Z Sun, L Guo, ZH Muhammad… - Chinese Journal of …, 2022 - Wiley Online Library
Multiple secondary users (SUs) perform collaborative spectrum sensing (CSS) in cognitive
radio networks to improve the sensing performance. However, this system severely …

Reliability of autonomous Internet of Things systems with intrusion detection attack-defense game design

DC Wang, R Chen, H Al-Hamadi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article we develop an intrusion detection attack-defense game for Internet of Things
(IoT) systems for which autonomous IoT devices collaboratively solve a problem. We …

A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks

M Ghaznavi, A Jamshidi - Computer Communications, 2019 - Elsevier
In cognitive radio networks, the security attacks disrupt the spectrum sensing process. One
of the most threatening attacks is spectrum sensing data falsification (SSDF) attack, where …

Improved likelihood ratio statistic‐based cooperative spectrum sensing for cognitive radio

DK Patel, B Soni, M López‐Benítez - IET Communications, 2020 - Wiley Online Library
Cooperative spectrum sensing (CSS) is a technique where multiple cognitive radio users
cooperate among themselves to make binary decisions about the presence of a primary …