Trust and reputation management in cognitive radio networks: a survey
暂无分享,去创建一个
[1] Danijela Cabric,et al. Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.
[2] Dirk Grunwald,et al. Scalability of cognitive radio control algorithms , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.
[3] Shuai Li,et al. Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing , 2011, 2011 IEEE International Conference on Communications (ICC).
[4] Carlo S. Regazzoni,et al. A comparison among cooperative spectrum sensing approaches for cognitive radios , 2010, 2010 2nd International Workshop on Cognitive Information Processing.
[5] Bahman Abolhassani,et al. Optimum number of secondary users and optimum fusion rule in cooperative spectrum sensing to maximize channel throughput , 2010, 2010 5th International Symposium on Telecommunications.
[6] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[7] Chunyan Miao,et al. Dynamic witness selection for trustworthy distributed cooperative sensing in cognitive radio networks , 2011, 2011 IEEE 13th International Conference on Communication Technology.
[8] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[9] Zhou Su,et al. Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.
[10] Guanghua Zhang,et al. Using Trust to Establish Cooperative Spectrum Sensing Framework , 2011 .
[11] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[12] Shu Wang,et al. Secure cooperative spectrum sensing for Cognitive Radio networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[13] Zhu Han,et al. Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..
[14] Mainak Chatterjee,et al. Trust based fusion over noisy channels through anomaly detection in cognitive radio networks , 2011, SIN '11.
[15] Xiaohong Jiang,et al. A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Security.
[16] Lei Zhang,et al. A new cooperative spectrum sensing algorithm for cognitive radio networks , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[17] Haiming Wang,et al. Double Thresholds Based Cooperative Spectrum Sensing Against Untrusted Secondary Users in Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[18] Sae-Young Chung,et al. Cognitive Networks Achieve Throughput Scaling of a Homogeneous Network , 2008, IEEE Transactions on Information Theory.
[19] Song Han,et al. Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[20] Prasant Mohapatra,et al. Trusted collaborative spectrum sensing for mobile cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.
[21] Qingqi Pei,et al. A Trust Management Model in Centralized Cognitive Radio Networks , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[22] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[23] H. T. Mouftah,et al. A stable clustering formation infrastructure protocol in mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[24] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[25] Jin Wei,et al. Two-Tier Optimal-Cooperation Based Secure Distributed Spectrum Sensing for Wireless Cognitive Radio Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[26] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..
[27] Zhu Han,et al. Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[28] H. Vincent Poor,et al. Cooperative Sensing With Imperfect Reporting Channels: Hard Decisions or Soft Decisions? , 2012, IEEE Transactions on Signal Processing.
[29] Zhu Han,et al. Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[30] Ying-Chang Liang,et al. Cognitive radio network architecture: part II -- trusted network layer structure , 2008, ICUIMC '08.
[31] Kamran Arshad,et al. Robust collaborative spectrum sensing based on beta reputation system , 2011, 2011 Future Network & Mobile Summit.
[32] Zhu Han,et al. Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.
[33] Chunyan Miao,et al. Towards a trust aware cognitive radio architecture , 2009, MOCO.
[34] Amir Ghasemi,et al. Opportunistic Spectrum Access in Fading Channels Through Collaborative Sensing , 2007, J. Commun..
[35] Juan Hernández-Serrano,et al. Cooperative detection of primary user emulation attacks in CRNs , 2012, Comput. Networks.
[36] Igor Nai Fovino,et al. Distributed access control policies for spectrum sharing , 2013, Secur. Commun. Networks.
[37] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[38] Anant Sahai,et al. Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.
[39] Robert Hooke,et al. `` Direct Search'' Solution of Numerical and Statistical Problems , 1961, JACM.
[40] Huifang Chen,et al. Reputation-based collaborative spectrum sensing algorithm in Cognitive Radio networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[41] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[42] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[43] Abolfazl Falahati,et al. SSDF protection in cooperative spectrum sensing employing a computational trust evaluation algorithm , 2010, 2010 5th International Symposium on Telecommunications.
[44] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[45] Wenliang Du,et al. Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.
[46] Vic Barnett,et al. Outliers in Statistical Data , 1980 .