Abstract
SummaryCognitive radio is proposed to solve the interference and underutilized license problems. With the development of the cognitive functionalities, classical and new security threats become challenging. To make wireless cognitive radio networks more secure and more reliable, several approaches have been proposed in the literature. In recent years, trust and reputation management (TRM) techniques are more and more considered for cognitive radio networks to secure them against the malicious and misbehaving users that try to deprive others from using the white space. The scope of this survey is to give a comprehensive overview about the existing TRM‐based mechanisms proposed for the cognitive radio networks. We expose the existing classifications of TRM techniques, then we introduce a new classification that takes into account, more exhaustively, different TRM properties and approaches.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.