Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation
暂无分享,去创建一个
[1] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[2] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[3] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[4] aw Kula. Fundamentals of Communication Systems , 2022 .
[5] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[6] Shu Lin,et al. Error control coding : fundamentals and applications , 1983 .
[7] Michel Barbeau,et al. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.
[8] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[9] Wang Wenbo,et al. Cyclostationarity-Based Spectrum Sensing for Wideband Cognitive Radio , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[10] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[11] Wenliang Du,et al. Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.
[12] Zhongding Lei,et al. DVB Detector for Cognitive Radio , 2007, 2007 IEEE International Conference on Communications.
[13] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[14] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[15] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[16] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[17] Kang G. Shin,et al. In-band spectrum sensing in cognitive radio networks: energy detection or feature detection? , 2008, MobiCom '08.
[18] Xianbin Wang,et al. Transmitter identification using embedded pseudo random sequences , 2004, IEEE Transactions on Broadcasting.
[19] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[20] Wenliang Du,et al. A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.