Addressing the Effects of the Spectrum Sensing Data Falsification Attack Using the Enhanced Q-out-of-m Rule
Author:
Mthulisi VelempiniORCID,
Issah Ngomane,
Semaka Mapunya SekgoariORCID
Publisher
Springer Singapore
Reference20 articles.
1. Mapunya S, Velempini M (2019) The design of byzantine attack mitigation scheme in cognitive radio ad-hoc networks. In: Proceedings of 2018 international conference on intelligent and innovative computing applications (ICONIC), Holiday Inn Mauritius, Mon Trésor, Plaine Magnien, Mauritius
2. Wei Z-H, Hu B-J (2018) A fair multi-channel assignment algorithm with practical implementation in distributed cognitive radio networks. IEEE Access 6:14255–14267
3. Boddapati KH, Bhatnagar RM, Prakriya S (2018) Performance of incremental relaying protocols for cooperative multi-hop CRNs. IEEE Trans Veh Technol 67(7):6006–6022
4. Mapunya SS, Velempini M (2019) The design and implementation of a robust scheme to combat the effect of malicious nodes in cognitive radio ad hoc networks. South Afr Comput J 2(31):178–194
5. Tephillah S, Manickam ML (2020) An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks. Wirel Commun Mob Comput 2020:1–9