Research Article
An SETM Algorithm for Combating SSDF Attack in Cognitive Radio Networks
Table 3
Evaluation of all types of trusts with malicious behaviour of SU.
| Sl. No | Percentage of malicious behaviour | Past event trust | Registry trust | Requite trust | Reliability trust | Cumulative trust |
| 1. | 10% | 8.5 | 1 | 0.9 | 0.90 | 1.676 | 2. | 20% | 6.5 | 1 | 0.8 | 0.86 | 1.434 | 3. | 30% | 4.5 | 1 | 0.7 | 0.84 | 1.196 | 4. | 40% | 2.5 | 1 | 0.6 | 0.83 | 0.958 | 5. | 50% | 0.5 | 1 | 0.5 | 0.83 | 0.716 | 6. | 60% | -1.5 | 1 | 0.4 | 0.83 | 0.502 | 7. | 70% | -3.5 | 1 | 0.3 | 0.84 | 0.176 | 8. | 80% | -5.5 | 1 | 0.2 | 0.86 | -0.046 | 9. | 90% | -7.5 | 1 | 0.1 | 0.90 | -0.264 |
|
|