@article{Ammar_Rehan_2021, place={Al Bayda, Libya}, title={Cognitive Radio Networks Based on Users’ Reputation Scheme}, volume={36}, url={https://omu.edu.ly/journals/index.php/mjsc/article/view/35}, DOI={10.54172/mjsc.v36i2.35}, abstractNote={<p>Cognitive Radio (CR) can be defined as a technology that allows users to change the transmission parameters as required to increase the spectrum efficiency. Because of this mechanism, some threats emerge. Two major threats are found in CR. The first is the Primary User Emulation Attack (PUEA), where the attacker is able to transmit at a forbidden time slot effectively, emulating the signals of the primary user. This makes all the system users believe that the spectrum is occupied by a good primary user.  The second threat is known as the spectrum sensing data falsification attack (SSDF). In this case, the attackers send false observation information, intentionally or unintentionally, to the fusion center (FC), causing it to make the wrong decision. In this study, the scheme presented  was based on a users’ reputation for secure spectrum access in cognitive radio networks. Each Secondary User (SU) performs local sensing and then forwards the sensing results to the main fusion center FC. The FC makes the final decision about the presence of the primary user based on the proposed approach. The schemes substantially reduce the effect of cognitive users with low reputation values while improving the impact of cognitive users with the high reputation values on the final decision. It has been verified that the proposed approach can improve the sensing performance under the impact of a different number of reliable and unreliable users in a CR network. Results based on simulation show that the proposed scheme outperforms the traditional majority scheme despite a high number of malicious users.</p>}, number={2}, journal={Al-Mukhtar Journal of Sciences}, author={Ammar, Mahmoud A. and Rehan, Salahedin A.}, year={2021}, month={Jun.}, pages={129–134} }