Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead
暂无分享,去创建一个
Gianmarco Baldini | Abdur Rahim Biswas | Taj A. Sturman | Gyözö Gódor | Michael Street | Ruediger Leschhorn | A. Biswas | G. Baldini | M. Street | G. Gódor | T. Sturman | R. Leschhorn
[1] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[2] Yuan Zhang,et al. Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[3] A.R. Hammons,et al. A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[4] Antonio Martin,et al. SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS , 2004 .
[5] Jim Alves-Foss,et al. The MILS architecture for high-assurance embedded systems , 2006, Int. J. Embed. Syst..
[6] T. Ulversoy,et al. Software Defined Radio: Challenges and Opportunities , 2010, IEEE Communications Surveys & Tutorials.
[7] Peter C. Mason,et al. Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[8] S. Anand,et al. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[9] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[10] Zhu Han,et al. Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[11] Symeonidis Dimitrios,et al. Certification of SDRS in New Public and Governmental Security Systems , 2008 .
[12] Didem Gözüpek,et al. A novel handover protocol to prevent hidden node problem in satellite assisted cognitive radio networks , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.
[13] Kiseon Kim,et al. On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[14] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[15] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[16] Zhu Han,et al. CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[17] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[18] Maria-Gabriella Di Benedetto,et al. A Survey on MAC Strategies for Cognitive Radio Networks , 2012, IEEE Communications Surveys & Tutorials.
[19] Dzmitry Kliazovich,et al. Cooperative Shared Spectrum Sensing for Dynamic Cognitive Radio Networks , 2009, 2009 IEEE International Conference on Communications.
[20] H. Vincent Poor,et al. Software Radio , 1999, IEEE Personal Communications.
[21] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[22] Fabrizio Granelli,et al. Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities , 2010, IEEE Communications Magazine.
[23] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[24] K. P. Subbalakshmi,et al. Towards Secure Spectrum Decision , 2009, 2009 IEEE International Conference on Communications.
[25] Haiming Wang,et al. Double Thresholds Based Cooperative Spectrum Sensing Against Untrusted Secondary Users in Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[26] John A. Copeland,et al. An anti-cloning framework for software defined radio mobile devices , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[27] Jim Hoffmeyer,et al. Radio software download for commercial wireless reconfigurable devices , 2004, IEEE Communications Magazine.
[28] D. Borth,et al. Considerations for Successful Cognitive Radio Systems in US TV White Space , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[29] Zhu Han,et al. Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..
[30] Roy H. Campbell,et al. Threat analysis of GNU software radio , 2005 .
[31] N.R. Prasad. Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.
[32] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[33] Niraj K. Jha,et al. An architecture for secure software defined radio , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.
[34] Zhongding Lei,et al. IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.
[35] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[36] Jim Alves-Foss,et al. A multi-layered approach to security in high assurance systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[37] Jeffrey H. Reed,et al. Understanding the software communications architecture , 2009, IEEE Communications Magazine.
[38] Yuping Zhao,et al. A New Cooperative Detection Technique with Malicious User Suppression , 2009, 2009 IEEE International Conference on Communications.
[39] Guosen Yue,et al. Anti-jamming coding techniques with application to cognitive radio , 2009, IEEE Transactions on Wireless Communications.
[40] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[41] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[42] A. Sahai,et al. Spectrum Enforcement and Liability Assignment in Cognitive Radio Systems , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[43] T.X. Brown,et al. Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[44] Apurva N. Mody,et al. Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[45] Máire O'Neill,et al. Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[46] Danijela Cabric,et al. Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.
[47] Wenjing Lou,et al. Security, privacy, and accountability in wireless access networks , 2009, IEEE Wireless Communications.
[48] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[49] Neeli Rashmi Prasad,et al. Secure Physical Layer using Dynamic Permutations in Cognitive OFDMA Systems , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[50] Kazuhiro Uehara,et al. Proposal and evaluation of security schemes for software-defined radio , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[51] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[52] Ryuji Kohno,et al. Secure download system based on software defined radio composed of FPGAs , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[53] Richard C. Reinhart,et al. Open Architecture Standard for NASA's Software-Defined Space Telecommunications Radio Systems , 2007, Proceedings of the IEEE.
[54] Li Zhu,et al. Two Types of Attacks against Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.
[55] Douglas M. Blough,et al. Securing the download of radio configuration files for software defined radio devices , 2004, MobiWac '04.
[56] E.O. Nuallain. A Proposed Propagation-Based Methodology with Which to Address the Hidden Node Problem and Security/Reliability Issues in Cognitive Radio , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[57] Masahiro Kuroda,et al. A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[58] Filip Perich,et al. Policy-based spectrum access control for dynamic spectrum access network radios , 2009, J. Web Semant..
[59] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..
[60] Jie Peng,et al. The Research of Cross-Layer Architecture Design and Security for Cognitive Radio Network , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.
[61] D.C. Sicker,et al. Difficulties in providing certification and assurance for software defined radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[62] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[63] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[64] Lei Zhang,et al. Cooperative Spectrum Sensing with Double Threshold Detection Based on Reputation in Cognitive Radio , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[65] Zhu Han,et al. Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[66] Xiaohua Li,et al. Secure transmission power of cognitive radios for dynamic spectrum access applications , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[67] Shiwen Mao,et al. Overhead Analysis for Radio Environment Mapenabled Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[68] Oriol Sallent,et al. ETSI reconfigurable radio systems: status and future directions on software defined radio and cognitive radio standards , 2010, IEEE Communications Magazine.
[69] Caidan Zhao,et al. A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.
[70] Li-Fung Chang,et al. Privacy and authentication on a portable communications system , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.
[71] Shu Wang,et al. Secure cooperative spectrum sensing for Cognitive Radio networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[72] Ryuji Kohno,et al. A framework for secure download for software-defined radio , 2002 .
[73] Gianmarco Baldini,et al. European Standardization and SDR Certification , 2010, 2010 Sixth Advanced International Conference on Telecommunications.
[74] Awais Khawar,et al. Security threats to signal classifiers using self-organizing maps , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[75] Guosen Yue,et al. Design of Anti-Jamming Coding for Cognitive Radio , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[76] S. Arkoulis,et al. Cognitive Spectrum and Its Security Issues , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.
[77] Jun-ichi Takada,et al. ACU and RSM Based Radio Spectrum Management for Realization of Flexible Software Defined Radio World , 2003 .
[78] Daniel W. Bliss. Optimal SISO and MIMO Spectral Efficiency to Minimize Hidden-Node Network Interference , 2010, IEEE Communications Letters.
[79] Rahim Tafazolli,et al. A Comparison Between the Centralized and Distributed Approaches for Spectrum Management , 2011, IEEE Communications Surveys & Tutorials.
[80] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[81] Wade Trappe,et al. TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[82] Ben Y. Zhao,et al. Multi-channel Jamming Attacks using Cognitive Radios , 2007, 2007 16th International Conference on Computer Communications and Networks.