While the attack targets the fusion center, the fusion center can collect sensing information from many other users, either
legitimate secondary users or malicious users. If most of the sensing information is from legitimate users, the fusion center
will have a high probability to make a right decision to determine which information would be real