《Tab.1 Attack strategy》

《Tab.1 Attack strategy》   提示:宽带有限、当前游客访问压缩模式
本系列图表出处文件名:随高清版一同展现
《一种对抗协作频谱感知中拜占庭攻击的博弈论方法(英文)》


  1. 获取 高清版本忘记账户?点击这里登录
  1. 下载图表忘记账户?点击这里登录

The attacker launches IA w hile the channel is being used by the PU.The FC's final decision is also accurate,and the attacker has to leave due to no benefits,and such a situation is denoted as IA-L.When the channel is unused,the attacker w ith IA can access it as w ell as the reliable SUs for transmitting data,w hich is denoted as IA-nO.After all SUs have sensed the active or inactive PU,since the attacker implements NA and operates like reliable SUs,the final decision is also idle or busy;therefore,both the attacker and reliable SUs access the unused channel or sw itch to another channel after the sensing slot.These tw o situations are respectively denoted as NA-L and NA-nO.Notably,NA-nO means no difference betw een the unintentional attacker and reliable SUs.Through the above analyses,the attack strategy is listed in Tab.1