Figure - available from: Telecommunication Systems
This content is subject to copyright. Terms and conditions apply.
False alarm probability in our proposed model

False alarm probability in our proposed model

Source publication
Article
Full-text available
The nature of cognitive radio (CR) technology creates a lot of opportunities for attackers. When an attack occurs, the function of the primary network is affected and thus the overall system performance will be reduced. In the present paper, we introduce and simulate a novel method for identifying spectral sensing data falsification (SSDF) attack a...

Similar publications

Article
Full-text available
Non-orthogonal multiple access (NOMA) is a multiple access technique that allows multiple users to share the same communication resources, resulting in increased spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) in terms of spectral efficiency and throughput. In th...
Article
Full-text available
Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenari...
Preprint
Full-text available
The transmission optimization of VR video streaming can improve the quality of user experience, which includes content prediction optimization and caching strategy optimization. Existing work either focuses on content prediction or on caching strategy. However, in the end-edge-cloud system, prediction and caching should be considered together. In t...

Citations

... The proposed SVM-BO algorithm performance are compared with other existing techniques such as MGWO [29], RbCUB [30], CbAES [31] and SSDF [32] in terms of average node power, detection probability, signal-to-noise ratio and average coverage time. The comparison performance are demonstrated in figures. ...
Article
Full-text available
The identification of the presence of primary user enhances the spectrum efficiency in cognitive radio (CR). The studies suggested that the existence of malicious user adversely affects the system performances; especially the primary user emulation attack (PUEA) has a greater influence in spectrum sensing on the CR network. Moreover, the detection of PUEA is a challenging and complex task and involves constructive design with sensing algorithm. In this study, a support vector machine (SVM) along with energy vectors is designed to improve the spectrum sensing mechanism. The presented approach integrates the SVM with the Bayesian optimization algorithm (BOA) in which SVM aims to detect the malicious user by randomly selecting the primary and secondary users. The BOA aims to optimize the hyperparameters of the SVM, thereby improving the detection performances and maximizes the algorithms convergence speed. The experimental analysis illustrate that the presented approach predicts the PUEA with 98% accuracy and reduces the average node power is 9.7. Moreover, the results demonstrated that the system performance does not vary on implementing it with the large-scale CR network. Finally, the system performances are compared and evaluated with existing techniques in terms of accuracy, and average noise power.