A Survey on C-RAN Security
暂无分享,去创建一个
Peng Zhang | Zheng Yan | Fengyu Tian | Zheng Yan | Peng Zhang | Fengyu Tian
[1] Zhengang Pan,et al. Toward green and soft: a 5G perspective , 2014, IEEE Communications Magazine.
[2] Dirk Wübben,et al. Cloud technologies for flexible 5G radio access networks , 2014, IEEE Communications Magazine.
[3] Kaigui Bian,et al. Security vulnerabilities in IEEE 802.22 , 2008, WICON 2008.
[4] Sachin Shetty,et al. Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks , 2012, 2012 41st International Conference on Parallel Processing Workshops.
[5] Xiaorui Wang,et al. Security technology in virtualization system: State of the art and future direction , 2012 .
[6] Xuelong Li,et al. Recent Advances in Cloud Radio Access Networks: System Architectures, Key Techniques, and Open Issues , 2016, IEEE Communications Surveys & Tutorials.
[7] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[8] Umer Salim,et al. RAN as a service: Challenges of designing a flexible RAN architecture in a cloud-based heterogeneous mobile network , 2013, 2013 Future Network & Mobile Summit.
[9] Abhinav Srivastava,et al. Hardening OpenStack Cloud Platforms against Compute Node Compromises , 2016, AsiaCCS.
[10] Zahir Tari,et al. Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.
[11] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[12] Kaigui Bian,et al. MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .
[13] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[14] Máire O'Neill,et al. Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[15] Yonggang Wen,et al. Cloud radio access network (C-RAN): a primer , 2015, IEEE Network.
[16] Yi Zheng,et al. Cooperative Spectrum Sensing Based on SNR Comparison in Fusion Center for Cognitive Radio , 2009, 2009 International Conference on Advanced Computer Control.
[17] Yunfei Chen. Collaborative spectrum sensing in the presence of secondary user interferences for lognormal shadowing , 2012, Wirel. Commun. Mob. Comput..
[18] Bo Ai,et al. Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors , 2014, IEEE Access.
[19] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[20] J. Mitola,et al. Software radios: Survey, critical evaluation and future directions , 1992, IEEE Aerospace and Electronic Systems Magazine.
[21] Roy D. Yates,et al. Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[22] Joseph Mitola. Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..
[23] Santhanakrishnan Anand,et al. Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.
[24] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[25] Zhu Han,et al. Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[26] Jie Li,et al. Joint Spectrum Sensing and Resource Allocation Scheme in Cognitive Radio Networks with Spectrum Sensing Data Falsification Attack , 2016, IEEE Transactions on Vehicular Technology.
[27] Michael S. Berger,et al. Cloud RAN for Mobile Networks—A Technology Overview , 2015, IEEE Communications Surveys & Tutorials.
[28] Min Sheng,et al. Exploiting Hybrid Clustering and Computation Provisioning for Green C-RAN , 2016, IEEE Journal on Selected Areas in Communications.
[29] Feng Zhu,et al. Enhanced robust cooperative spectrum sensing in cognitive radio , 2009, Journal of Communications and Networks.
[30] Zhu Han,et al. CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[31] Kaushik R. Chowdhury,et al. A survey on MAC protocols for cognitive radio networks , 2009, Ad Hoc Networks.
[32] Supeng Leng,et al. Joint Scheduling and Beamforming Coordination in Cloud Radio Access Networks With QoS Guarantees , 2016, IEEE Transactions on Vehicular Technology.
[33] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[34] T. C. Aysal,et al. Cooperative Spectrum Sensing with Noisy Hard Decision Transmissions , 2009, 2009 IEEE International Conference on Communications.
[35] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[36] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[37] Wenliang Du,et al. A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[38] Qing Wang,et al. Wireless network cloud: Architecture and system requirements , 2010, IBM J. Res. Dev..
[39] Carlos A. Pomalaza-Raez,et al. Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[40] Kang G. Shin,et al. OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.
[41] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[42] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[43] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[44] Vincent W. S. Wong,et al. A Dynamic Resource Sharing Mechanism for Cloud Radio Access Networks , 2016, IEEE Transactions on Wireless Communications.