Skip to main content

Table 2 Authentication header

From: Security management based on trust determination in cognitive radio networks

Symbol

Meaning

Identity

User identity

Time

Time

C i

Cluster

v i j

The initial trust value

R1,R2,⋯R n

Resource list

λ1,λ2,⋯λ n

Resource access threshold

SC

Service capacity