From: Security management based on trust determination in cognitive radio networks
Symbol | Meaning |
---|---|
Identity | User identity |
Time | Time |
C i | Cluster |
v i j | The initial trust value |
R1,R2,⋯R n | Resource list |
λ1,λ2,⋯λ n | Resource access threshold |
SC | Service capacity |