SpecGuard: Spectrum misuse detection in dynamic spectrum access systems
暂无分享,去创建一个
Chi Zhang | Rui Zhang | Yanchao Zhang | Xiaocong Jin | Jingchao Sun | Jingchao Sun | Chi Zhang | Yanchao Zhang | Rui Zhang | X. Jin
[1] Wenliang Du,et al. Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.
[2] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[3] Shuai Li,et al. Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.
[4] Ami Wiesel,et al. SNR estimation in time-varying fading channels , 2006, IEEE Transactions on Communications.
[5] Rui Zhang,et al. SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users , 2015, CCS.
[6] Ming Li,et al. Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.
[7] Umberto Mengali,et al. A comparison of pilot-aided channel estimation methods for OFDM systems , 2001, IEEE Trans. Signal Process..
[8] Ben Y. Zhao,et al. Toward Practical Spectrum Permits , 2017, IEEE Transactions on Cognitive Communications and Networking.
[9] G. Denker,et al. A Policy Engine for Spectrum Sharing , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[10] Kaigui Bian,et al. Blind Transmitter Authentication for Spectrum Security and Enforcement , 2014, CCS.
[11] Kang G. Shin,et al. Detection of Small-Scale Primary Users in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.
[12] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[13] Carl A. Gunter,et al. Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[14] Dirk Grunwald,et al. Secret Agent Radio: Covert Communication through Dirty Constellations , 2012, Information Hiding.
[15] Chunming Qiao,et al. Crowdsourcing Access Network Spectrum Allocation Using Smartphones , 2014, HotNets.
[16] Rui Zhang,et al. Secure crowdsourced radio environment map construction , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).
[17] Wenliang Du,et al. A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[18] Shuai Li,et al. Location privacy preservation in collaborative spectrum sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[19] Tao Li,et al. DPSense: Differentially Private Crowdsourced Spectrum Sensing , 2016, CCS.
[20] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[21] Konstantina Papagiannaki,et al. Towards an Energy-Star WLAN Infrastructure , 2007 .
[22] Ian F. Akyildiz,et al. Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..
[23] Kaigui Bian,et al. PHY-layer authentication by introducing controlled inter symbol interference , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[24] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[25] Chi Zhang,et al. Secure crowdsourcing-based cooperative pectrum sensing , 2013, 2013 Proceedings IEEE INFOCOM.
[26] Paramvir Bahl,et al. Towards an Architecture for Efficient Spectrum Slicing , 2007, Eighth IEEE Workshop on Mobile Computing Systems and Applications.
[27] Larry J. Greenstein,et al. ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.
[28] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[29] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[30] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[31] Wade Trappe,et al. TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[32] Zhenfu Cao,et al. Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.
[33] Xiaocong Jin,et al. Privacy-preserving crowdsourced spectrum sensing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[34] Lei Yang,et al. Enforcing dynamic spectrum access with spectrum permits , 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks.