Figure 13From: Exploiting and defending trust models in cooperative spectrum sensingComparison of the RCD results between RSF and SSDF intrusions.S A , number of attacked sensors; S P , number of sensors protected by the RCD.Back to article page