Figure 13From: Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio NetworksDynamic suspicious level in proposed scheme (two malicious nodes perform FA attack during time [5, 15]).Back to article page