Cryptographic link signatures for spectrum usage authentication in cognitive radio
暂无分享,去创建一个
Wenliang Du | Xi Tan | Biao Chen | Kapil M. Borle | Wenliang Du | Xi Tan | Biao Chen
[1] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[2] Simon Haykin,et al. Digital Communications , 2017 .
[3] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[4] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[5] Adrian Perrig,et al. Secure broadcast communication in wired and wireless networks , 2002 .
[6] G. Staple,et al. The end of spectrum scarcity [spectrum allocation and utilization] , 2004, IEEE Spectrum.
[7] John E. Kleider,et al. Radio frequency watermarking for OFDM wireless networks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[8] Xianbin Wang,et al. Transmitter identification using embedded pseudo random sequences , 2004, IEEE Transactions on Broadcasting.
[9] Deepa Kundur,et al. Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.
[10] Michel Barbeau,et al. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.
[11] Stephen J. Shellhammer,et al. Performance of power detector sensors of DTV signals in IEEE 802.22 WRANs , 2006, TAPAS '06.
[12] Zhongding Lei,et al. DVB Detector for Cognitive Radio , 2007, 2007 IEEE International Conference on Communications.
[13] Peter Steenkiste,et al. Proceedings of the 14th ACM international conference on Mobile computing and networking , 2008, MobiCom 2008.
[14] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[15] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[16] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[17] Kang G. Shin,et al. In-band spectrum sensing in cognitive radio networks: energy detection or feature detection? , 2008, MobiCom '08.
[18] Wang Wenbo,et al. Cyclostationarity-Based Spectrum Sensing for Wideband Cognitive Radio , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[19] Shu Wang,et al. Correlation-based spectrum sensing in cognitive radio , 2009, CoRoNet '09.
[20] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[21] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[22] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.