Research Article

An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks

Algorithm 2

Input: , , , , ,
Output: Cumulative trust calculation and inference about SUi
 (1) Calculate the past events trust using equation (10)
 (2) Calculate the participation trust using equation (11)
 (3) Calculate the requite trust using equation (12)
 (4) Calculate the reliability trust using equation (13)
 (5) Find the cumulative Trust using equation (14)
 (6) If , then SUi = Genuine  else SUi = Random malicious attacker