{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:01:47Z","timestamp":1723014107768},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,3,21]],"date-time":"2014-03-21T00:00:00Z","timestamp":1395360000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2014,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Cognitive radio (CR) is a promising technology that brings about remarkable improvement in spectrum utilization. To tackle the hidden terminal problem, cooperative spectrum sensing (CSS) which benefits from the spatial diversity has been studied extensively. Since CSS is vulnerable to the attacks initiated by malicious secondary users (SUs), several secure CSS schemes based on Dempster-Shafer theory have been proposed. However, the existing works only utilize the current difference of SUs, such as the difference in SNR or similarity degree, to evaluate the trustworthiness of each SU. As the current difference is only one-sided and sometimes inaccurate, the statistical information contained in each SU's historical behavior should not be overlooked. In this article, we propose a robust CSS scheme based on Dempster-Shafer theory and trustworthiness degree calculation. It is carried out in four successive steps, which are basic probability assignment (BPA), trustworthiness degree calculation, selection and adjustment of BPA, and combination by Dempster-Shafer rule, respectively. Our proposed scheme evaluates the trustworthiness degree of SUs from both current difference aspect and historical behavior aspect and exploits Dempster-Shafer theory's potential to establish a \u2018soft update\u2019 approach for the reputation value maintenance. It can not only differentiate malicious SUs from honest ones based on their historical behaviors but also reserve the current difference for each SU to achieve a better real-time performance. Abundant simulation results have validated that the proposed scheme outperforms the existing ones under the impact of different attack patterns and different number of malicious SUs.<\/jats:p>","DOI":"10.1186\/1687-6180-2014-35","type":"journal-article","created":{"date-parts":[[2014,3,21]],"date-time":"2014-03-21T04:01:54Z","timestamp":1395374514000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A robust cooperative spectrum sensing scheme based on Dempster-Shafer theory and trustworthiness degree calculation in cognitive radio networks"],"prefix":"10.1186","volume":"2014","author":[{"given":"Jinlong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shuo","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Qihui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xueqiang","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yuhua","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Guoru","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"issue":"2","key":"608_CR1","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/JSAC.2004.839380","volume":"23","author":"S Haykin","year":"2005","unstructured":"Haykin S: Cognitive radio: brain-empowered wireless communications. IEEE J. Sel. Areas. Commun. 2005, 23(2):201-220.","journal-title":"IEEE J. Sel. Areas. Commun"},{"issue":"5","key":"608_CR2","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1109\/JPROC.2009.2015716","volume":"97","author":"KB Letaief","year":"2009","unstructured":"Letaief KB, Zhang W: Cooperative communications for cognitive radio networks. Proc. IEEE 2009, 97(5):878-893.","journal-title":"Proc. IEEE"},{"issue":"4","key":"608_CR3","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/JPROC.2009.2013012","volume":"97","author":"J Mitola","year":"2009","unstructured":"Mitola J: Cognitive radio architecture evolution. Proc. IEEE 2009, 97(4):626-641.","journal-title":"Proc. IEEE"},{"key":"608_CR4","doi-asserted-by":"crossref","unstructured":"Xu YH, Anpalagan A, Wu QH, Shen L, Gao Z, Wang JL: Decision-theoretic distributed channel selection for opportunistic spectrum access: strategies, challenges and solutions. Surv. Tutor: IEEE Commun; doi:10.1109\/SURV.2013.030713.00189","DOI":"10.1109\/SURV.2013.030713.00189"},{"issue":"4","key":"608_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCOM.2008.4481339","volume":"46","author":"IF Akyildiz","year":"2008","unstructured":"Akyildiz IF, Lee W-Y, Vuran MC: A survey on spectrum management in cognitive radio networks. IEEE Commun. Mag. 2008, 46(4):40-48.","journal-title":"IEEE Commun. Mag"},{"issue":"2","key":"608_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.4304\/jcm.2.2.71-82","volume":"2","author":"A Ghasemi","year":"2007","unstructured":"Ghasemi A, Sousa ES: Opportunistic spectrum access in fading channels through collaborative sensing. J. Commun. 2007, 2(2):71-82.","journal-title":"J. Commun"},{"issue":"12","key":"608_CR7","doi-asserted-by":"publisher","first-page":"4761","DOI":"10.1109\/T-WC.2008.060857","volume":"7","author":"W Zhang","year":"2008","unstructured":"Zhang W, Letaief KB: Cooperative spectrum sensing with transmit and relay diversity in cognitive radio networks. IEEE Trans. Wirel. Commun. 2008, 7(12):4761-4766.","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"1","key":"608_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/JSTSP.2007.914880","volume":"2","author":"J Unnikrishnan","year":"2008","unstructured":"Unnikrishnan J, Veeravalli VV: Cooperative sensing for primary detection in cognitive radio. IEEE J. Sel. Topics. Signal. Process. 2008, 2(1):18-27.","journal-title":"IEEE J. Sel. Topics. Signal. Process"},{"issue":"4","key":"608_CR9","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MSP.2013.2251071","volume":"30","author":"GR Ding","year":"2013","unstructured":"Ding GR, Wu QH, Yao Y-D: Kernel-based learning for statistical signal processing in cognitive radio networks. IEEE Signal Process. Mag. 2013, 30(4):126-136.","journal-title":"IEEE Signal Process. Mag"},{"key":"608_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1904-0","volume-title":"Distributed Detection and Data Fusion","author":"PK Varshney","year":"1997","unstructured":"Varshney PK: Distributed Detection and Data Fusion. New York: Springer; 1997."},{"key":"608_CR11","volume-title":"Fundamentals of Statistical Signal Processing: Detection Theory","author":"SM Kay","year":"1998","unstructured":"Kay SM: Fundamentals of Statistical Signal Processing: Detection Theory. New Jersey: Prentice-Hall; 1998."},{"issue":"2","key":"608_CR12","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1109\/TIT.2004.840879","volume":"51","author":"B Chen","year":"2005","unstructured":"Chen B, Willett PK: On the optimality of the likelihood-ratio test for local sensor decision rules in the presence of non-ideal channels. IEEE Trans. Inform. Theory. 2005, 51(2):693-699. 10.1109\/TIT.2004.840879","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"608_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/JSTSP.2007.914882","volume":"2","author":"Z Quan","year":"2008","unstructured":"Quan Z, Cui SG, Sayed AH: Optimal linear cooperation for spectrum sensing in cognitive radio networks. IEEE J. Sel. Topics Signal. Process. 2008, 2(1):28-40.","journal-title":"IEEE J. Sel. Topics Signal. Process"},{"key":"608_CR14","first-page":"2511","volume-title":"Indoor and Mobile Radio Communications (IEEE PIMRC)","author":"QH Peng","year":"2006","unstructured":"Peng QH, Zeng K, Wang J, Li SQ: A distributed spectrum sensing scheme based on credibility and evidence theory in cognitive radio context, in 17th IEEE International Symposium on Personal . In Indoor and Mobile Radio Communications (IEEE PIMRC). IEEE, Piscataway; 2006:2511-2515."},{"issue":"7","key":"608_CR15","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/LCOMM.2009.090043","volume":"13","author":"N-T Nhan","year":"2009","unstructured":"Nhan N-T, Insoo K: An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context. IEEE Commun. Lett. 2009, 13(7):492-494.","journal-title":"IEEE Commun. Lett"},{"key":"608_CR16","first-page":"1","volume-title":"An enhanced D-S theory cooperative spectrum sensing algorithm against SSDF attack, in 75th IEEE Vehicular Technology Conference (IEEE VTC Spring)","author":"Y Han","year":"2012","unstructured":"Han Y, Chen Q, Wang J-X: An enhanced D-S theory cooperative spectrum sensing algorithm against SSDF attack, in 75th IEEE Vehicular Technology Conference (IEEE VTC Spring). IEEE: Piscataway; 2012:1-5."},{"issue":"12","key":"608_CR17","doi-asserted-by":"crossref","first-page":"3644","DOI":"10.1587\/transcom.E92.B.3644","volume":"92","author":"N-T Nhan","year":"2009","unstructured":"Nhan N-T, Insoo K: A robust secure cooperative spectrum sensing scheme based on evidence theory and robust statistics in cognitive radio. IEICE Trans. Commun. 2009, 92(12):3644-3652.","journal-title":"IEICE Trans. Commun"},{"issue":"9","key":"608_CR18","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1109\/TIFS.2013.2273305","volume":"8","author":"S Jana","year":"2013","unstructured":"Jana S, Zeng K, Cheng W, Mohapatra P: Trusted collaborative spectrum sensing for mobile cognitive radio networks. IEEE Trans. Inf. Foren. Sec. 2013, 8(9):1497-1507.","journal-title":"IEEE Trans. Inf. Foren. Sec"},{"issue":"1","key":"608_CR19","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TVT.2010.2086501","volume":"60","author":"N-T Nhan","year":"2011","unstructured":"Nhan N-T, Insoo K: Evidence-theory-based cooperative spectrum sensing with efficient quantization method in cognitive radio. IEEE Trans. Veh. Technol. 2011, 60(1):185-195.","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"4","key":"608_CR20","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1109\/PROC.1967.5573","volume":"55","author":"H Urkowitz","year":"1967","unstructured":"Urkowitz H: Energy detection of unknown deterministic signals. Proc. IEEE 1967, 55(4):523-531.","journal-title":"Proc. IEEE"},{"issue":"4","key":"608_CR21","first-page":"1","volume":"2010","author":"WK Wang","year":"2010","unstructured":"Wang WK, Li HS, Sun Y, Han Z: Securing collaborative spectrum sensing against untrustworthy secondary users in cognitive radio networks. EURASIP J. Adv. Signal Process. 2010, 2010(4):1-15.","journal-title":"EURASIP J. Adv. Signal Process"},{"key":"608_CR22","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G Shafer","year":"1976","unstructured":"Shafer G: A Mathematical Theory of Evidence. New Jersey: Princeton; 1976."},{"key":"608_CR23","volume-title":"Uncertainty and Information: Foundations of Generalized Information Theory","author":"GJ Klir","year":"2006","unstructured":"Klir GJ: Uncertainty and Information: Foundations of Generalized Information Theory. New Jersey: Wiley; 2006."},{"key":"608_CR24","volume-title":"Robust distributed spectrum sensing in cognitive radio networks, in 27th IEEE International Conference on Computer Communications","author":"RL Chen","year":"2008","unstructured":"Chen RL, Park JM, Bian K: Robust distributed spectrum sensing in cognitive radio networks, in 27th IEEE International Conference on Computer Communications. IEEE INFOCOM) (IEEE: Piscataway; 2008. pp. 31\u201335"},{"key":"608_CR25","first-page":"1","volume-title":"WQ Cheng, S Wang, A robust and efficient cooperative spectrum sensing scheme in cognitive radio networks, in 58th IEEE International Conference on Computer Communications (IEEE ICC)","author":"F Gao","year":"2010","unstructured":"Gao F, Yuan W, Liu W: WQ Cheng, S Wang, A robust and efficient cooperative spectrum sensing scheme in cognitive radio networks, in 58th IEEE International Conference on Computer Communications (IEEE ICC). IEEE: Piscataway; 2010:1-5."},{"issue":"3","key":"608_CR26","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/LCOMM.2010.03.092240","volume":"14","author":"K Zeng","year":"2010","unstructured":"Zeng K, Pawelczak P, Cabric D: Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Commun. Lett. 2010, 14(3):226-228.","journal-title":"IEEE Commun. Lett"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-35.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-6180-2014-35\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-35.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T03:19:32Z","timestamp":1630552772000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-6180-2014-35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,21]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["608"],"URL":"https:\/\/doi.org\/10.1186\/1687-6180-2014-35","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,21]]},"assertion":[{"value":"8 January 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"35"}}