Taxonomy of security attacks and threats in cognitive radio networks
暂无分享,去创建一个
[1] Zhiyong Feng,et al. A survey of security issues in Cognitive Radio Networks , 2015 .
[2] Fei Hu,et al. Spectrum Sharing in Wireless Networks : Fairness, Efficiency, and Security , 2016 .
[3] Johnson P. Thomas,et al. MAC-TCP cross-layer attack and its defense in cognitive radio networks , 2014, Q2SWinet '14.
[4] Ian F. Akyildiz,et al. A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.
[5] Song Han,et al. Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..
[6] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[7] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[8] J. Morris Chang,et al. A layered approach to cognitive radio network security: A survey , 2014, Comput. Networks.
[9] Natarajan Meghanathan. A Comprehensive Review and Analysis of Solutions for Different Layers ofthe TCP/IP Layer Stack and Security Issues for Cognitive Radio Networks , 1970 .
[10] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[11] Ningrinla Marchang,et al. Cognitive Radio Networks Security Threats and Attacks: A Review , 2014 .
[12] Husheng Li,et al. Cross-Layer Attack and Defense in Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[13] Natarajan Meghanathan,et al. A Survey on the Communication Protocols and Security in Cognitive Radio Networks , 2013, Int. J. Commun. Networks Inf. Secur..
[14] Valentin Rakovic,et al. Security Aspects of Policy Controlled Cognitive Radio , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[15] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[16] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[17] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[18] Erik G. Larsson,et al. Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances , 2012, IEEE Signal Processing Magazine.
[19] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[20] Kang G. Shin,et al. Cognitive radios for dynamic spectrum access: from concept to reality , 2010, IEEE Wireless Communications.
[21] Y. Thomas Hou,et al. Cognitive radio communications and networks: principles and practice , 2012 .
[22] Kaigui Bian,et al. MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .
[23] Mohamed Ibnkahla. Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle , 2014 .
[24] Maria-Gabriella Di Benedetto,et al. A Survey on MAC Strategies for Cognitive Radio Networks , 2012, IEEE Communications Surveys & Tutorials.
[25] Jing Zhao,et al. Robust Topology Control in Multi-Hop Cognitive Radio Networks , 2012, IEEE Transactions on Mobile Computing.
[26] Ghaith Hattab,et al. Multiband Spectrum Access: Great Promises for Future Cognitive Radio Networks , 2014, Proceedings of the IEEE.
[27] Qusay H. Mahmoud,et al. Cognitive Networks: Towards Self-Aware Networks , 2007 .
[28] Jim Esch,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proc. IEEE.
[29] Kaushik R. Chowdhury,et al. A survey on MAC protocols for cognitive radio networks , 2009, Ad Hoc Networks.