The objective of this research is to detect malicious users and to eliminate them from participating in the decision making process at the FC. The two types of malicious users considered here are namely, primary user emulation attack (PrUEA) and spectrum sensing data falsification (SSDF) attack. Two approaches are proposed in this work to detect malicious users. In the first approach, a reputation based clustering method with helper node assistance...