Research Article

An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks

Algorithm 1

Input: SU1r to SUSr from ts0 to tsk, , is integer, w(i).
Output: FCO: Final decision of FC, categorisation of types of MUs and genuine SUs.
 (1) Pile the sensing reports of ‘S’ SUs for the mentioned timeslot in the table
 (2) Compute the FCO by majority voting
 (3) Let d(i) be the FCO output at tsi
 (4) Let w(i) represent the count of participation in sensing
 (5) for d(i) = 0 or 1 & w(i) = k,
   if SUir = 1 ∀ tsk, then
    SUi = MU1 (ALWAYS YES MU)
  else go to next step
 (6) for d(i) = 0 or 1 & w(i) = k,
   If SUir = 0 ∀ tsk, then
    SUi = MU2 (ALWAYS NO MU)
  else go to next
 (7) for w(i) = k,
   if d(i) = 0 and SUir = 1 ∀ tsi &
   if d(i) =1 and SUir = 0 ∀ tsi
  then SUi = MU3 (ALTERNATOR)
  else go to next step
 (8) for d(i) = 0 or 1 & w(i) ≠ k,
   then SUi = MU4 (SELFISH)
     else SUi = Random or genuine