Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
暂无分享,去创建一个
Ming Li | Yiwei Thomas Hou | Wenjing Lou | Qiben Yan | Tingting Jiang | W. Lou | Y. T. Hou | Ming Li | Qiben Yan | Tingting Jiang
[1] Carl A. Gunter,et al. Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[2] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[3] Reza Olfati-Saber,et al. Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.
[4] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Ian F. Akyildiz,et al. CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.
[7] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[8] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[9] Zhiqiang Li,et al. A Distributed Consensus-Based Cooperative Spectrum-Sensing Scheme in Cognitive Radios , 2010, IEEE Transactions on Vehicular Technology.
[10] Weifang Wang,et al. Spectrum sensing in cognitive radio , 2016 .
[11] Kang G. Shin,et al. Robust cooperative sensing via state estimation in cognitive radio networks , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).
[12] John W. Tukey,et al. Data Analysis and Regression: A Second Course in Statistics , 1977 .
[13] Ali Farhadi,et al. Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks , 2011, NDSS.
[14] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[15] Anant Sahai,et al. What is a Spectrum Hole and What Does it Take to Recognize One? , 2009, Proceedings of the IEEE.
[16] Murti V. Salapaka,et al. Distributed protocol for determlisleg when averaging consensus Is readied , 2007 .
[17] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[18] Zhu Han,et al. Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.
[19] Ian F. Akyildiz,et al. Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..
[20] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[21] Murti V Salapaka,et al. Distributed protocol for determining when averaging consensus is reached , 2007 .
[22] F. Richard Yu,et al. Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios , 2010, IEEE Network.