A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions
暂无分享,去创建一个
Athanasios V. Vasilakos | Victor C. M. Leung | F. Richard Yu | Alireza Attar | Helen Tang | F. Yu | A. Vasilakos | A. Attar | Helen Tang
[1] Hamid Aghvami,et al. Cognitive Radio game for secondary spectrum access problem , 2009, IEEE Transactions on Wireless Communications.
[2] M. J. Gans,et al. On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas , 1998, Wirel. Pers. Commun..
[3] Chunyan Miao,et al. A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.
[4] Lang Tong,et al. Betting on Gilbert-Elliot channels , 2010, IEEE Transactions on Wireless Communications.
[5] Kang G. Shin,et al. Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.
[6] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[7] S. Roberts,et al. Constrained bandwidth allocation in multi-sensor information fusion: a mechanism design approach , 2005, 2005 7th International Conference on Information Fusion.
[8] Simon Haykin,et al. Robust Transmit Power Control for Cognitive Radio , 2009, Proceedings of the IEEE.
[9] Anant Sahai,et al. SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.
[10] Ekram Hossain,et al. Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .
[11] Geoffrey Ye Li,et al. Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, IEEE Trans. Commun..
[12] Lutz H.-J. Lampe,et al. Joint Sidelobe and Peak Power Reduction in OFDM-Based Cognitive Radio , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.
[13] Feng Gao,et al. A Robust and Efficient Cooperative Spectrum Sensing Scheme in Cognitive Radio Networks , 2010, 2010 IEEE International Conference on Communications Workshops.
[14] Qing Zhao,et al. Quickest Detection in Multiple On–Off Processes , 2010, IEEE Transactions on Signal Processing.
[15] Özgür B. Akan,et al. BIOlogically-Inspired Spectrum Sharing in Cognitive Radio Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[16] Abhay Parekh,et al. Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.
[17] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[18] Athanasios V. Vasilakos,et al. A market-clearing model for spectrum trade in cognitive radio networks , 2011, MobiHoc '11.
[19] Zhu Han,et al. Dynamic Spectrum Access and Management in Cognitive Radio Networks: References , 2009 .
[20] Ying-Chang Liang,et al. Robust precoding for orthogonal space-time block coded MIMO cognitive radio networks , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.
[21] Peter Dayan,et al. Q-learning , 1992, Machine Learning.
[22] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[23] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[24] Guosen Yue,et al. Design of Anti-Jamming Coding for Cognitive Radio , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[25] Amir Ghasemi,et al. Spectrum sensing in cognitive radio networks: the cooperation-processing tradeoff , 2007 .
[26] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[27] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
[28] Jiaheng Wang,et al. Robust cognitive radio via game theory , 2010, 2010 IEEE International Symposium on Information Theory.
[29] F. Richard Yu,et al. Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios , 2010, IEEE Network.
[30] Ji Yang,et al. IEEE P1900.B: Coexistence Support for Reconfigurable, Heterogeneous Air Interfaces , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[31] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[32] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[33] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..
[34] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[35] Zhiqiang Li,et al. A Distributed Consensus-Based Cooperative Spectrum-Sensing Scheme in Cognitive Radios , 2010, IEEE Transactions on Vehicular Technology.
[36] Kang G. Shin,et al. Attack-tolerant distributed sensing for dynamic spectrum access networks , 2009, 2009 17th IEEE International Conference on Network Protocols.
[37] Vikram Krishnamurthy,et al. Game Theoretic Issues in Cognitive Radio Systems (Invited Paper) , 2009, J. Commun..
[38] Albert-László Barabási,et al. Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.
[39] Dominique Noguet,et al. Sensing techniques for Cognitive Radio - State of the art and trends , 2009 .
[40] F. Richard Yu,et al. Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks , 2010, Wirel. Networks.
[41] Ali Zamani,et al. Communication System Recognition by Modulation Recognition , 2004, ICT.
[42] Victor C. M. Leung,et al. Denial of Service Attacks in Cognitive Radio Networks through Channel Eviction Triggering , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[43] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[44] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[45] Eitan Altman,et al. Jamming in Wireless Networks Under Uncertainty , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[46] Zhu Han,et al. Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[47] Helen Tang,et al. Lightweight Integrated Authentication for Tactical MANETs , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[48] Geoffrey Ye Li,et al. Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[49] O. Holland,et al. Dynamic Scalable Software Downloads for Mobile Terminal Mass-upgrades , 2007, 2007 16th IST Mobile and Wireless Communications Summit.
[50] Tung-Sang Ng,et al. Robust Beamforming in Cognitive Radio , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[51] R. Venkatesha Prasad,et al. Cognitive functionality in next generation wireless networks: standardization efforts , 2008, IEEE Communications Magazine.
[52] Hamid Aghvami,et al. A Universal Resource Awareness Channel for Cognitive Radio , 2006, 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications.
[53] Zhu Han,et al. Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.
[54] Chunyan Miao,et al. Towards a trust aware cognitive radio architecture , 2009, MOCO.
[55] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[56] Anant Sahai,et al. Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.
[57] Zhongding Lei,et al. IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.
[58] Apurva N. Mody,et al. Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[59] Qing Zhao,et al. Distributed Learning in Multi-Armed Bandit With Multiple Players , 2009, IEEE Transactions on Signal Processing.
[60] Shamik Sengupta,et al. Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2010, 2010 IEEE International Conference on Communications.
[61] James Gross,et al. Robust Clustering of Ad-Hoc Cognitive Radio Networks under Opportunistic Spectrum Access , 2011, 2011 IEEE International Conference on Communications (ICC).
[62] Guanding Yu,et al. On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.
[63] Eitan Altman,et al. Jamming in wireless networks under uncertainty , 2009, WiOpt.
[64] Peter C. Mason,et al. Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[65] Li Zhu,et al. Two Types of Attacks against Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.
[66] Mohamed-Slim Alouini,et al. On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.
[67] Olasunkanmi Durowoju,et al. Distributed Power Control for Cognitive Radio Networks, Based on Incumbent Outage Information , 2011, 2011 IEEE International Conference on Communications (ICC).
[68] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[69] Vikram Krishnamurthy,et al. Quickest Time Herding and Detection for Optimal Social Learning , 2010, ArXiv.
[70] Zhu Han,et al. Distributed Coalition Formation Games for Secure Wireless Transmission , 2009, Mob. Networks Appl..
[71] Mingyan Liu,et al. Optimality of Myopic Sensing in Multi-Channel Opportunistic Access , 2008, 2008 IEEE International Conference on Communications.
[72] Tharmalingam Ratnarajah,et al. Joint Transceiver Beamforming in MIMO Cognitive Radio Network Via Second-Order Cone Programming , 2012, IEEE Transactions on Signal Processing.
[73] Máire O'Neill,et al. Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[74] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[75] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[76] Shlomo Shamai,et al. Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.
[77] Gerd Ascheid,et al. MSE-based linear transceiver optimization in MIMO cognitive radio networks with imperfect channel knowledge , 2010, 2010 2nd International Workshop on Cognitive Information Processing.
[78] H. Vincent Poor,et al. Cognitive Medium Access: Exploration, Exploitation, and Competition , 2007, IEEE Transactions on Mobile Computing.
[79] Tung-Sang Ng,et al. Robust beamforming in cognitive radio , 2010 .
[80] Ananthram Swami,et al. Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework , 2007, IEEE Journal on Selected Areas in Communications.