Journal of Systems Engineering and Electronics ›› 2020, Vol. 31 ›› Issue (2): 243-251.doi: 10.23919/JSEE.2020.000002
• Electronics Technology • Previous Articles Next Articles
Fang YE(), Ping BAI(
), Yuan TIAN*(
)
Received:
2019-01-14
Online:
2020-04-30
Published:
2020-04-30
Contact:
Yuan TIAN
E-mail:yefang0923@126.com;baiping0325@126.com;tianyuan347@126.com
About author:
YE Fang was born in 1980. She received her B.S. and Ph.D. degrees in electrical information engineering from Harbin Engineering University in 2002 and 2006, respectively. During 2007-2008, she worked as a visiting scholar in University of Southampton. At present, she is an associate professor in Harbin Engineering University. Her research interests include cognitive radio network and radio resource management. E-mail: Supported by:
Fang YE, Ping BAI, Yuan TIAN. An algorithm based on evidence theory and fuzzy entropy to defend against SSDF[J]. Journal of Systems Engineering and Electronics, 2020, 31(2): 243-251.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
1 |
HAYKIN S. Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 2005, 23 (2): 201- 220.
doi: 10.1109/JSAC.2004.839380 |
2 |
SUN Q, TIAN Y, DIAO M. Cooperative localization algorithm based on hybrid topology architecture for multiple mobile robot system. IEEE Internet of Things Journal, 2018, 5 (6): 4753- 4763.
doi: 10.1109/JIOT.2018.2812179 |
3 |
MITOLA J, MAGUIRE G Q. Cognitive radio: making software radios more personal. IEEE Personal Communications, 1999, 6 (4): 13- 18.
doi: 10.1109/98.788210 |
4 | NIU C, LI Y, HU R Q, et al. Fast and efficient radio resource allocation in dynamic ultra-dense heterogeneous networks. IEEE Access, 2017, 5 (99): 1911- 1924. |
5 | ALTHUNIBAT S, DENISE B J, GRANELLI F. Secure cluster-based cooperative spectrum sensing against malicious attackers. Proc. of the IEEE Globecom Workshops, 2015, 1284- 1289. |
6 | XIE J, CHEN J, WU D. Cooperative spectrum sensing for cognitive radios over fading channels. Proc. of the International Conference on Computer Science and Network Technology, 2012, 1962- 1966. |
7 |
SHARIFI A A, NIYA J M. Securing collaborative spectrum sensing against malicious attackers in cognitive radio networks. Wireless Personal Communications, 2016, 90 (1): 1- 17.
doi: 10.1007/s11277-016-3599-8 |
8 | SHINDE S C, JADHAV A N. Centralized cooperative spectrum sensing with energy detecion in cognitive radio and optimization. Proc. of the IEEE International Conference on Recent Trends in Electronics, 2017, 1002- 1006. |
9 | ZHOU M, SHEN J, CHEN H, et al. A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks. Proc. of the IEEE Wireless Communications and Networking Conference, 2013, 614- 619. |
10 |
DO N, AN B. A soft-hard combination-based cooperative spectrum sensing scheme for cognitive radio networks. Sensors, 2015, 15 (2): 4388- 4407.
doi: 10.3390/s150204388 |
11 | MUSTAPHA I, MOHD ALI B, RASID M F, et al. A weighted hard combination scheme for cooperative spectrum sensing in cognitive radio sensor networks. Proc. of the IEEE Malaysia International Conference on Communications, 2016, 12- 17. |
12 |
AKYILDIZ I F, LEE W Y, CHOWDHURY K R. CRAHNs: cognitive radio ad hoc networks. Ad Hoc Networks, 2009, 7 (5): 810- 836.
doi: 10.1016/j.adhoc.2009.01.001 |
13 | BI Y, JING X, SUN S, et al. Hierarchical fusion-based cooperative spectrum sensing scheme in cognitive radio networks. Proc. of the International Symposium on Communications and Information Technologies, 2016, 579- 583. |
14 | SHEN B, CUI T P, KWAK K, et al. An optimal soft fusion scheme for cooperative spectrum sensing in cognitive radio network. Proc. of the IEEE Wireless Communications and Networking Conference, 2009, 1- 5. |
15 | PEI Q Q, YUAN B B, LI L, et al. A sensing and etiquette reputation-based trust management for centralized cognitive radio networks. Neurocomputing, 2013, 101 (3): 129- 138. |
16 |
ZHANG J, CAI L, ZHANG S. Malicious cognitive user identification algorithm in centralized spectrum sensing system. Future Internet, 2017, 9 (4): 79.
doi: 10.3390/fi9040079 |
17 |
FENG J Y, ZHANG M, XIAO Y, et al. Securing cooperative spectrum sensing against collusive SSDF attack using XOR distance analysis in cognitive radio networks. Sensors, 2018, 18 (2): 370.
doi: 10.3390/s18020370 |
18 |
ZHANG W Q, DENG Y. Combining conflicting evidence using the DEMATEL method. Soft Computing, 2019, 23 (17): 8207- 8216.
doi: 10.1007/s00500-018-3455-8 |
19 | ZHANG X, TANG X, TIAN F. A spectrum sensing algorithm based on improved D-S evidence theory. Computer Technology and Development, 2014, 24 (6): 44- 48. |
20 | GHOSH S, BHOWMICK A, NALLAGONDA S, et al. Performance of weighted fusion based spectrum sensing under double threshold in cognitive radio network. Proc. of the IEEE International Conference on Microelectronics, Computing and Communications, 2016: 1-4. |
21 | PENG Q, ZENG K, WANG J, et al. A distributed spectrum sensing scheme based on credibility and evidence theory in cognitive radio context. Proc. of the IEEE International Symposium on Personal Indoor and Mobile Radio Communications, 2006: 1-5. |
22 | NIE M, SHAO J, LI B. Cooperative sensing algorithm based on dynamic double threshold and D-S evidence theory. Journal of Nanjing Normal University (Engineering and Technology Edition), 2014, 14 (2): 43- 48. |
23 | FENG J Y, LI J L, LU G Y. Evaluating uncertainty behaviors of cognitive users against SSDF attack for cooperative spectrum sensing. Telecommunications Science, 2015, 31 (2): 97- 102. |
24 | MEN S, CHARGÉ P, PILLEMENT S. A robust cooperative spectrum sensing method against faulty nodes in CWSNs. Proc. of the IEEE International Conference on Communication Workshop, 2015: 334-339. |
25 | YU M T, ZHAO L J, LI Z. Improved cooperative spectrum sensing scheme based on Dempster-Shafer theory in cognitive radio network. Journal on Communications, 2014, 35 (3): 168- 173. |
26 |
ZHANG L, DING G, WU Q, et al. Defending against byzantine attack in cooperative spectrum sensing: defense reference and performance analysis. IEEE Access, 2016, 4, 4011- 4024.
doi: 10.1109/ACCESS.2016.2593952 |
27 |
LI Y B, YANG R, YE F, et al. Improved spectrum sharing algorithm based on feedback control informationin cognitive radio networks. Systems Engineering and Electronics, 2013, 24 (4): 564- 570.
doi: 10.1109/JSEE.2013.00065 |
28 | KIM H, RYU E. Delegation based user authentication framework over cognitive radio networks. Journal of Sensor & Actuator Networks, 2017, 6 (4): 29. |
29 |
SUN R, DENG Y. A new method to identify incomplete frame of discernment in evidence theory. IEEE Access, 2019, 7, 15547- 15555.
doi: 10.1109/ACCESS.2019.2893884 |
30 | LI Y, DENG Y. Generalized ordered propositions fusion based on belief entropy. International Journal of Computers Communications & Control, 2018, 13 (5): 792- 807. |
31 |
LIU Y T, PAL N R, MARATHE A R, et al. Weighted fuzzy Dempster-Shafer framework for multimodal information integration. IEEE Trans. on Fuzzy Systems, 2018, 26 (1): 338- 352.
doi: 10.1109/TFUZZ.2017.2659764 |
[1] | Jinfu FENG, Qiang ZHANG, Junhua HU, An LIU. Dynamic assessment method of air target threat based on improved GIFSS [J]. Journal of Systems Engineering and Electronics, 2019, 30(3): 525-534. |
[2] | Chengkun LUO, Yunxiang CHEN, Huachun XIANG, Weijia WANG, Zezhou WANG. Evidence combination method in time domain based on reliability and importance [J]. Journal of Systems Engineering and Electronics, 2018, 29(6): 1308-1316. |
[3] | Baoping WANG, Jianjun MA, Zhaoxuan HAN, Yan ZHANG, Yang FANG, Yimeng GE. Adaptive image enhancement algorithm based on fuzzy entropy and human visual characteristics [J]. Journal of Systems Engineering and Electronics, 2018, 29(5): 1079-1088. |
[4] | Kun ZHANG, Weiren KONG, Peipei LIU, Jiao SHI, Yu LEI, Jie ZOU. Assessment and sequencing of air target threat based on intuitionistic fuzzy entropy and dynamic VIKOR [J]. Journal of Systems Engineering and Electronics, 2018, 29(2): 305-310. |
[5] | Wen JIANG, Tian YANG, Yehang SHOU, Yongchuan TANG, Weiwei HU. Improved evidential fuzzy c-means method [J]. Journal of Systems Engineering and Electronics, 2018, 29(1): 187-195. |
[6] | Wensheng Peng, Jianguo Zhang, and Jinyang Zhang. Novel dynamic evidential Petri net for system reliability analysis [J]. Systems Engineering and Electronics, 2017, 28(5): 1019-1027. |
[7] | Wenhao Bi, An Zhang, and Yuan Yuan. Combination method of conflict evidences based on evidence similarity [J]. Systems Engineering and Electronics, 2017, 28(3): 503-513. |
[8] | Zhensong Chen, Shenghua Xiong, Yanlai Li, and Kwai-Sang Chin. Entropy measures of type-2 intuitionistic fuzzy sets and type-2 triangular intuitionistic trapezodial fuzzy sets [J]. Journal of Systems Engineering and Electronics, 2015, 26(4): 774-. |
[9] | Hongming Mo, Cai Gao, and Yong Deng. Evidential method to identify influential nodes in complex networks [J]. Journal of Systems Engineering and Electronics, 2015, 26(2): 381-387. |
[10] | Bin Suo, Yongsheng Cheng, Chao Zeng, and Jun Li. Computational intelligence approach for uncertainty quantification using evidence theory [J]. Journal of Systems Engineering and Electronics, 2013, 24(2): 250-260. |
[11] | Zhang Chengyi, Li Dongya, Fu Haiyan & Chen Guohui. Transformation and entropy for fuzzy rough sets [J]. Journal of Systems Engineering and Electronics, 2008, 19(1): 94-98. |
[12] | Yang Yan, Jing Zhanrong, Gao Tian & Wang Huilong. Multi-sources information fusion algorithm in airborne detection systems [J]. Journal of Systems Engineering and Electronics, 2007, 18(1): 171-176. |
[13] | Oxen Tianlu & Que Peiwen. Target recognition based on modified combination rule * [J]. Journal of Systems Engineering and Electronics, 2006, 17(2): 279-283. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||