Research Article

Securing Cooperative Spectrum Sensing against DC-SSDF Attack Using Trust Fluctuation Clustering Analysis in Cognitive Radio Networks

Procedure 4

Perfect trust mechanism.
Input:  C, , , and ;
Output:  ,
(1) for  each   do
(2)if    then
(3)
(4)
(5)deleted ’s sensing data
(6)else
(7)if    then
(8)
(9)else
(10)
(11)end if
(12)end if
(13) end for