Figure 12From: Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio NetworksDynamic suspicious level in proposed scheme (two malicious nodes perform FA attack during time [20, 100]).Back to article page