According to the reputation model and data delivery, thecredibility of sensing nodes can be estimated, and each sensing nodes increment their counters compared with the attackers. When the FC makes a global decision that the channel isidle, it will schedule a node to access the channel for datatransmission, and evaluate the actual status of the channelthrough the success or failure of the data transmission ofthe node being scheduled. If the sensing report sent to theFC is inconsistent with the actual status of the channel, thecounter value of the sensing node will be incremented by1. Otherwise, the value of the counter will keep unchanged.After M sensing intervals, if the value of the counter is higherthan the predetermined threshold, the relevant sensing nodewill be regarded as a malicious node. The counter value of the i-th sensing node at k-th time interval can be expressed as
According to the reputation model and data delivery, thecredibility of sensing nodes can be estimated, and each sensing nodes increment their counters compared with the attackers. When the FC makes a global decision that the channel isidle, it will schedule a node to access the channel for datatransmission, and evaluate the actual status of the channelthrough the success or failure of the data transmission ofthe node being scheduled. If the sensing report sent to theFC is inconsistent with the actual status of the channel, thecounter value of the sensing node will be incremented by1. Otherwise, the value of the counter will keep unchanged.After M sensing intervals, if the value of the counter is higherthan the predetermined threshold, the relevant sensing nodewill be regarded as a malicious node. The counter value of the i-th sensing node at k-th time interval can be expressed as<br>
正在翻译中..