Research Article
A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users
| (1) For = 1 to total iterations | | (2) For=1 to total SUs | | (3) if PU is available | | (4) th user sensing in th interval | | (5) if > threshold | | (6) local decision (Reporting 1 as hard decision), | | (7) else | | (8) local decision (Reporting 0 as hard decision) | | (9) end | | (10) end | | (11) end | | (12) if Sensing limit | | (13) Compile the results for simple HDF schemes | | (14) Simple AND | | (15) Simple OR | | (16) Simple Majority voting | | (17) else | | (18) Identify | | (19) Run Outlier Tests using to detect outliers | | (20) Compile results for Modified HDF schemes | | (21) end | | (22) if | | (23) AND global Decision as | | (24) else | | (25) AND global Decision as | | (26) end | | (27) Compile results for Modified HDF schemes if | | (28) OR global Decision as | | (29) else | | (30) OR global Decision as | | (31) end | | (32) if | | (33) Voting global Decision as | | (34) else | | (35) Voting global Decision as | | (36) end | | (37) end of iterations |
|