Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach
Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the...
Ausführliche Beschreibung
Autor*in: |
Adelantado, Ferran [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2013transfer abstract |
---|
Schlagwörter: |
---|
Umfang: |
14 |
---|
Übergeordnetes Werk: |
Enthalten in: Sialorphin and its analog as ligands for copper(II) ions - Kamysz, Elżbieta ELSEVIER, 2013transfer abstract, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:11 ; year:2013 ; number:8 ; pages:2367-2380 ; extent:14 |
Links: |
---|
DOI / URN: |
10.1016/j.adhoc.2013.06.002 |
---|
Katalog-ID: |
ELV027138127 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV027138127 | ||
003 | DE-627 | ||
005 | 20230625151522.0 | ||
007 | cr uuu---uuuuu | ||
008 | 180603s2013 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.adhoc.2013.06.002 |2 doi | |
028 | 5 | 2 | |a GBVA2013007000004.pica |
035 | |a (DE-627)ELV027138127 | ||
035 | |a (ELSEVIER)S1570-8705(13)00125-X | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | |a 004 | |
082 | 0 | 4 | |a 004 |q DE-600 |
082 | 0 | 4 | |a 540 |q VZ |
082 | 0 | 4 | |a 300 |a 610 |q VZ |
084 | |a 44.06 |2 bkl | ||
100 | 1 | |a Adelantado, Ferran |e verfasserin |4 aut | |
245 | 1 | 0 | |a Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach |
264 | 1 | |c 2013transfer abstract | |
300 | |a 14 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. | ||
520 | |a Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. | ||
650 | 7 | |a Cognitive radio ad hoc network |2 Elsevier | |
650 | 7 | |a Kruskal–Wallis test |2 Elsevier | |
650 | 7 | |a MAC layer security |2 Elsevier | |
650 | 7 | |a Malicious user detection |2 Elsevier | |
700 | 1 | |a Verikoukis, Christos |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier Science |a Kamysz, Elżbieta ELSEVIER |t Sialorphin and its analog as ligands for copper(II) ions |d 2013transfer abstract |g Amsterdam [u.a.] |w (DE-627)ELV016769562 |
773 | 1 | 8 | |g volume:11 |g year:2013 |g number:8 |g pages:2367-2380 |g extent:14 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.adhoc.2013.06.002 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a SSG-OLC-PHA | ||
936 | b | k | |a 44.06 |j Medizinsoziologie |q VZ |
951 | |a AR | ||
952 | |d 11 |j 2013 |e 8 |h 2367-2380 |g 14 | ||
953 | |2 045F |a 004 |
author_variant |
f a fa |
---|---|
matchkey_str |
adelantadoferranverikoukischristos:2013----:eetoomlcossricgiieaiahcewrsnnaa |
hierarchy_sort_str |
2013transfer abstract |
bklnumber |
44.06 |
publishDate |
2013 |
allfields |
10.1016/j.adhoc.2013.06.002 doi GBVA2013007000004.pica (DE-627)ELV027138127 (ELSEVIER)S1570-8705(13)00125-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 540 VZ 300 610 VZ 44.06 bkl Adelantado, Ferran verfasserin aut Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach 2013transfer abstract 14 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection Elsevier Verikoukis, Christos oth Enthalten in Elsevier Science Kamysz, Elżbieta ELSEVIER Sialorphin and its analog as ligands for copper(II) ions 2013transfer abstract Amsterdam [u.a.] (DE-627)ELV016769562 volume:11 year:2013 number:8 pages:2367-2380 extent:14 https://doi.org/10.1016/j.adhoc.2013.06.002 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.06 Medizinsoziologie VZ AR 11 2013 8 2367-2380 14 045F 004 |
spelling |
10.1016/j.adhoc.2013.06.002 doi GBVA2013007000004.pica (DE-627)ELV027138127 (ELSEVIER)S1570-8705(13)00125-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 540 VZ 300 610 VZ 44.06 bkl Adelantado, Ferran verfasserin aut Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach 2013transfer abstract 14 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection Elsevier Verikoukis, Christos oth Enthalten in Elsevier Science Kamysz, Elżbieta ELSEVIER Sialorphin and its analog as ligands for copper(II) ions 2013transfer abstract Amsterdam [u.a.] (DE-627)ELV016769562 volume:11 year:2013 number:8 pages:2367-2380 extent:14 https://doi.org/10.1016/j.adhoc.2013.06.002 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.06 Medizinsoziologie VZ AR 11 2013 8 2367-2380 14 045F 004 |
allfields_unstemmed |
10.1016/j.adhoc.2013.06.002 doi GBVA2013007000004.pica (DE-627)ELV027138127 (ELSEVIER)S1570-8705(13)00125-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 540 VZ 300 610 VZ 44.06 bkl Adelantado, Ferran verfasserin aut Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach 2013transfer abstract 14 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection Elsevier Verikoukis, Christos oth Enthalten in Elsevier Science Kamysz, Elżbieta ELSEVIER Sialorphin and its analog as ligands for copper(II) ions 2013transfer abstract Amsterdam [u.a.] (DE-627)ELV016769562 volume:11 year:2013 number:8 pages:2367-2380 extent:14 https://doi.org/10.1016/j.adhoc.2013.06.002 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.06 Medizinsoziologie VZ AR 11 2013 8 2367-2380 14 045F 004 |
allfieldsGer |
10.1016/j.adhoc.2013.06.002 doi GBVA2013007000004.pica (DE-627)ELV027138127 (ELSEVIER)S1570-8705(13)00125-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 540 VZ 300 610 VZ 44.06 bkl Adelantado, Ferran verfasserin aut Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach 2013transfer abstract 14 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection Elsevier Verikoukis, Christos oth Enthalten in Elsevier Science Kamysz, Elżbieta ELSEVIER Sialorphin and its analog as ligands for copper(II) ions 2013transfer abstract Amsterdam [u.a.] (DE-627)ELV016769562 volume:11 year:2013 number:8 pages:2367-2380 extent:14 https://doi.org/10.1016/j.adhoc.2013.06.002 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.06 Medizinsoziologie VZ AR 11 2013 8 2367-2380 14 045F 004 |
allfieldsSound |
10.1016/j.adhoc.2013.06.002 doi GBVA2013007000004.pica (DE-627)ELV027138127 (ELSEVIER)S1570-8705(13)00125-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 540 VZ 300 610 VZ 44.06 bkl Adelantado, Ferran verfasserin aut Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach 2013transfer abstract 14 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection Elsevier Verikoukis, Christos oth Enthalten in Elsevier Science Kamysz, Elżbieta ELSEVIER Sialorphin and its analog as ligands for copper(II) ions 2013transfer abstract Amsterdam [u.a.] (DE-627)ELV016769562 volume:11 year:2013 number:8 pages:2367-2380 extent:14 https://doi.org/10.1016/j.adhoc.2013.06.002 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.06 Medizinsoziologie VZ AR 11 2013 8 2367-2380 14 045F 004 |
language |
English |
source |
Enthalten in Sialorphin and its analog as ligands for copper(II) ions Amsterdam [u.a.] volume:11 year:2013 number:8 pages:2367-2380 extent:14 |
sourceStr |
Enthalten in Sialorphin and its analog as ligands for copper(II) ions Amsterdam [u.a.] volume:11 year:2013 number:8 pages:2367-2380 extent:14 |
format_phy_str_mv |
Article |
bklname |
Medizinsoziologie |
institution |
findex.gbv.de |
topic_facet |
Cognitive radio ad hoc network Kruskal–Wallis test MAC layer security Malicious user detection |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Sialorphin and its analog as ligands for copper(II) ions |
authorswithroles_txt_mv |
Adelantado, Ferran @@aut@@ Verikoukis, Christos @@oth@@ |
publishDateDaySort_date |
2013-01-01T00:00:00Z |
hierarchy_top_id |
ELV016769562 |
dewey-sort |
14 |
id |
ELV027138127 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV027138127</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625151522.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.adhoc.2013.06.002</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2013007000004.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV027138127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1570-8705(13)00125-X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">540</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">300</subfield><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">44.06</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Adelantado, Ferran</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">14</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cognitive radio ad hoc network</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kruskal–Wallis test</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">MAC layer security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malicious user detection</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Verikoukis, Christos</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">Kamysz, Elżbieta ELSEVIER</subfield><subfield code="t">Sialorphin and its analog as ligands for copper(II) ions</subfield><subfield code="d">2013transfer abstract</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV016769562</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:11</subfield><subfield code="g">year:2013</subfield><subfield code="g">number:8</subfield><subfield code="g">pages:2367-2380</subfield><subfield code="g">extent:14</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.adhoc.2013.06.002</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">44.06</subfield><subfield code="j">Medizinsoziologie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">11</subfield><subfield code="j">2013</subfield><subfield code="e">8</subfield><subfield code="h">2367-2380</subfield><subfield code="g">14</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
author |
Adelantado, Ferran |
spellingShingle |
Adelantado, Ferran ddc 004 ddc 540 ddc 300 bkl 44.06 Elsevier Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach |
authorStr |
Adelantado, Ferran |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV016769562 |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science 540 - Chemistry & allied sciences 300 - Social sciences 610 - Medicine & health |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
004 004 DE-600 540 VZ 300 610 VZ 44.06 bkl Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection Elsevier |
topic |
ddc 004 ddc 540 ddc 300 bkl 44.06 Elsevier Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection |
topic_unstemmed |
ddc 004 ddc 540 ddc 300 bkl 44.06 Elsevier Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection |
topic_browse |
ddc 004 ddc 540 ddc 300 bkl 44.06 Elsevier Cognitive radio ad hoc network Elsevier Kruskal–Wallis test Elsevier MAC layer security Elsevier Malicious user detection |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
c v cv |
hierarchy_parent_title |
Sialorphin and its analog as ligands for copper(II) ions |
hierarchy_parent_id |
ELV016769562 |
dewey-tens |
000 - Computer science, knowledge & systems 540 - Chemistry 300 - Social sciences, sociology & anthropology 610 - Medicine & health |
hierarchy_top_title |
Sialorphin and its analog as ligands for copper(II) ions |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV016769562 |
title |
Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach |
ctrlnum |
(DE-627)ELV027138127 (ELSEVIER)S1570-8705(13)00125-X |
title_full |
Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach |
author_sort |
Adelantado, Ferran |
journal |
Sialorphin and its analog as ligands for copper(II) ions |
journalStr |
Sialorphin and its analog as ligands for copper(II) ions |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works 500 - Science 300 - Social sciences 600 - Technology |
recordtype |
marc |
publishDateSort |
2013 |
contenttype_str_mv |
zzz |
container_start_page |
2367 |
author_browse |
Adelantado, Ferran |
container_volume |
11 |
physical |
14 |
class |
004 004 DE-600 540 VZ 300 610 VZ 44.06 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Adelantado, Ferran |
doi_str_mv |
10.1016/j.adhoc.2013.06.002 |
dewey-full |
004 540 300 610 |
title_sort |
detection of malicious users in cognitive radio ad hoc networks: a non-parametric statistical approach |
title_auth |
Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach |
abstract |
Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. |
abstractGer |
Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. |
abstract_unstemmed |
Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA |
container_issue |
8 |
title_short |
Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach |
url |
https://doi.org/10.1016/j.adhoc.2013.06.002 |
remote_bool |
true |
author2 |
Verikoukis, Christos |
author2Str |
Verikoukis, Christos |
ppnlink |
ELV016769562 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth |
doi_str |
10.1016/j.adhoc.2013.06.002 |
up_date |
2024-07-06T21:09:19.504Z |
_version_ |
1803865460054163456 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV027138127</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625151522.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.adhoc.2013.06.002</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2013007000004.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV027138127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1570-8705(13)00125-X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">540</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">300</subfield><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">44.06</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Adelantado, Ferran</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">14</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cognitive radio ad hoc networks (CRAHN) operation is based on the reliability of the spectrum sensing. It has been proved that cooperation between secondary users improves the accuracy of the sensing information gathered by the users. However, such cooperation also increases the vulnerability of the network and its exposure to attacks. The paper presents a novel algorithm based on the non-parametric Kruskal–Wallis and Conover–Inman tests to detect and identify the attack of malicious users at the MAC layer. The algorithm, denoted by KWD, does not assume a priori knowledge neither of the activity of the primary channel nor of the existence and the behavior of malicious users.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cognitive radio ad hoc network</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kruskal–Wallis test</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">MAC layer security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malicious user detection</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Verikoukis, Christos</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">Kamysz, Elżbieta ELSEVIER</subfield><subfield code="t">Sialorphin and its analog as ligands for copper(II) ions</subfield><subfield code="d">2013transfer abstract</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV016769562</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:11</subfield><subfield code="g">year:2013</subfield><subfield code="g">number:8</subfield><subfield code="g">pages:2367-2380</subfield><subfield code="g">extent:14</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.adhoc.2013.06.002</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">44.06</subfield><subfield code="j">Medizinsoziologie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">11</subfield><subfield code="j">2013</subfield><subfield code="e">8</subfield><subfield code="h">2367-2380</subfield><subfield code="g">14</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
score |
7.398777 |