Recent security issues on cognitive radio networks: A survey
暂无分享,去创建一个
[1] Xiuzhen Cheng,et al. Dynamic spectrum access: from cognitive radio to network radio , 2012, IEEE Wireless Communications.
[2] Hui Zhao,et al. Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels , 2015, 2015 IEEE International Conference on Communication Software and Networks (ICCSN).
[3] Shuai Li,et al. Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.
[4] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[5] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[6] Gurpreet Singh,et al. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.
[7] P. Agrawal,et al. Cognitive Radio Network setup without a Common Control Channel , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[8] Jun-ichi Takada,et al. ACU and RSM Based Radio Spectrum Management for Realization of Flexible Software Defined Radio World , 2003 .
[9] Sachin Shetty,et al. Dynamic Spectrum Access for Wireless Networks , 2015, SpringerBriefs in Electrical and Computer Engineering.
[10] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[11] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[12] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[13] Jaime Lloret Mauri,et al. Cognitive Networks: Applications and Deployments , 2014 .
[14] A. Sahai,et al. Spectrum Enforcement and Liability Assignment in Cognitive Radio Systems , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[15] Sachin Shetty,et al. Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems , 2016, IEEE Systems Journal.
[16] Zhu Han,et al. CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[17] Li Zhu,et al. Two Types of Attacks against Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.
[18] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[19] Olav Queseth,et al. Cooperative and selfish behaviour in unlicensed spectrum using the CSMA/CA protocol , 2004 .
[20] Shuguang Cui,et al. On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[21] Niraj K. Jha,et al. An architecture for secure software defined radio , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.
[22] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[23] Tongtong Li,et al. Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.
[24] Douglas M. Blough,et al. Securing the download of radio configuration files for software defined radio devices , 2004, MobiWac '04.
[25] Sachin Shetty,et al. Geolocation-aware resource management in cloud computing-based cognitive radio networks , 2014, Int. J. Cloud Comput..
[26] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[27] Zhu Han,et al. Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[28] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[29] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[30] Joseph Mitola,et al. Most Active Band (MAB) Attack and Countermeasures in a Cognitive Radio Network , 2012, IEEE Transactions on Wireless Communications.
[31] Do-Hoon Kim,et al. Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.
[32] Yiyang Pei,et al. Robust Beamforming Design: From Cognitive Radio MISO Channels to Secrecy MISO Channels , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[33] Scott D. Lathrop,et al. Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[34] Danda B. Rawat,et al. Precoder adaptation and power control for cognitive radios in dynamic spectrum access environments , 2012, IET Commun..