Research Article

A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users

Pseudocode 1

(1) For = 1 to total iterations
(2) For=1 to total SUs
(3)  if PU is available
(4) th user sensing in th interval
(5)   if > threshold
(6) local decision (Reporting 1 as hard decision),
(7)   else
(8) local decision (Reporting 0 as hard decision)
(9)   end
(10)  end
(11) end
(12)  if Sensing limit
(13) Compile the results for simple HDF schemes
(14) Simple AND
(15) Simple OR
(16) Simple Majority voting
(17)  else
(18) Identify
(19) Run Outlier Tests using to detect outliers
(20) Compile results for Modified HDF schemes
(21)  end
(22)  if
(23) AND global Decision as
(24)  else
(25) AND global Decision as
(26)  end
(27) Compile results for Modified HDF schemes if
(28) OR global Decision as
(29)  else
(30) OR global Decision as
(31)  end
(32)  if
(33) Voting global Decision as
(34)  else
(35) Voting global Decision as
(36)  end
(37) end of iterations