Research Article
An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks
Input: SU1r to SUSr from ts0 to tsk, ∈ , is integer, w(i). | Output: FCO: Final decision of FC, categorisation of types of MUs and genuine SUs. | (1) Pile the sensing reports of ‘S’ SUs for the mentioned timeslot in the table | (2) Compute the FCO by majority voting | (3) Let d(i) be the FCO output at tsi | (4) Let w(i) represent the count of participation in sensing | (5) for d(i) = 0 or 1 & w(i) = k, | if SUir = 1 ∀ tsk, then | SUi = MU1 (ALWAYS YES MU) | else go to next step | (6) for d(i) = 0 or 1 & w(i) = k, | If SUir = 0 ∀ tsk, then | SUi = MU2 (ALWAYS NO MU) | else go to next | (7) for w(i) = k, | if d(i) = 0 and SUir = 1 ∀ tsi & | if d(i) =1 and SUir = 0 ∀ tsi | then SUi = MU3 (ALTERNATOR) | else go to next step | (8) for d(i) = 0 or 1 & w(i) ≠ k, | then SUi = MU4 (SELFISH) | else SUi = Random or genuine |
|