Research Article
A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users
(1) For = 1 to total iterations | (2) For=1 to total SUs | (3) if PU is available | (4) th user sensing in th interval | (5) if > threshold | (6) local decision (Reporting 1 as hard decision), | (7) else | (8) local decision (Reporting 0 as hard decision) | (9) end | (10) end | (11) end | (12) if Sensing limit | (13) Compile the results for simple HDF schemes | (14) Simple AND | (15) Simple OR | (16) Simple Majority voting | (17) else | (18) Identify | (19) Run Outlier Tests using to detect outliers | (20) Compile results for Modified HDF schemes | (21) end | (22) if | (23) AND global Decision as | (24) else | (25) AND global Decision as | (26) end | (27) Compile results for Modified HDF schemes if | (28) OR global Decision as | (29) else | (30) OR global Decision as | (31) end | (32) if | (33) Voting global Decision as | (34) else | (35) Voting global Decision as | (36) end | (37) end of iterations |
|