Misbehavior Scenarios in Cognitive Radio Networks
暂无分享,去创建一个
Markus Fiedler | Giannis F. Marias | Alexandru Popescu | George C. Polyzos | Hermann de Meer | Stamatios Arkoulis | Pantelis A. Frangoudis | Jens O. Oberender | S. Arkoulis | G. Marias | M. Fiedler | P. A. Frangoudis | H. Meer | Alexandru Popescu | Stamatios Arkoulis
[1] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[2] Salil S. Kanhere,et al. NIS07-5: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks , 2006, IEEE Globecom 2006.
[3] Haitao Zheng,et al. Distributed spectrum allocation via local bargaining , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[4] Özgür B. Akan,et al. Cognitive radio sensor networks , 2009, IEEE Network.
[5] Anant Sahai,et al. Fundamental design tradeoffs in cognitive radio systems , 2006, TAPAS '06.
[6] Markus Fiedler,et al. A Fuzzy Set Theory Based Method to Discover Transmissions in Wireless Personal Area Networks , 2006, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06).
[7] Chien-Chung Shen,et al. Single-Radio Adaptive Channel Algorithm for Spectrum Agile Wireless Ad Hoc Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[8] Amitabha Das,et al. A survey on MAC protocols in OSA networks , 2009, Comput. Networks.
[9] K. J. Ray Liu,et al. Collusion-Resistant Multi-Winner Spectrum Auction for Cognitive Radio Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[10] F. Jondral,et al. Dynamic and local combined pricing, allocation and billing system with cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[11] Fernando Paganini,et al. Mechanism-based resource allocation for multimedia transmission over spectrum agile wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[12] George C. Polyzos,et al. The EIFFEL approach towards Visions for a Future Networked Society , 2009 .
[13] Ben Y. Zhao,et al. Utilization and fairness in spectrum assignment for opportunistic spectrum access , 2006, Mob. Networks Appl..
[14] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[15] P. Cramton,et al. Introduction to Combinatorial Auctions , 2006 .
[16] K. J. Ray Liu,et al. Multi-Stage Pricing Game for Collusion-Resistant Dynamic Spectrum Allocation , 2008, IEEE Journal on Selected Areas in Communications.
[17] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[18] Sisi Liu,et al. Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.
[19] Oriol Sallent,et al. A novel on-demand cognitive pilot channel enabling dynamic spectrum allocation , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[20] John Domingue,et al. The future of the internet , 1997, ACM '97.
[21] Morad Benyoucef,et al. A Rule-Driven Approach for Defining the Behaviour of Negotiating Software Agents , 2002, DCW.
[22] George C. Polyzos,et al. Secure interference reporting for dense Wi-Fi deployments , 2009, Co-Next Student Workshop '09.
[23] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[24] Jung-Min Park,et al. Tamper Resistance for Software Defined Radio Software , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[25] Wade Trappe,et al. TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[26] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.
[27] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[28] Alan Kai-Hau Yeung,et al. Challenges in the migration to 4G mobile systems , 2003, IEEE Commun. Mag..
[29] S. Arkoulis,et al. Cognitive Spectrum and Its Security Issues , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.
[30] Nitin H. Vaidya,et al. Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver , 2004, MobiHoc '04.
[31] Ying-Chang Liang,et al. Exploiting Hidden Power-Feedback Loops for Cognitive Radio , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[32] A. Sahai,et al. Spectrum Enforcement and Liability Assignment in Cognitive Radio Systems , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[33] C. Cordeiro,et al. C-MAC: A Cognitive MAC Protocol for Multi-Channel Wireless Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[34] Ravi Prakash,et al. MAC-layer scheduling in cognitive radio based multi-hop wireless networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[35] J.H. Reed,et al. Performance of Distributed Dynamic Frequency Selection Schemes for Interference Reducing Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[36] Dirk Grunwald,et al. A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[37] Elias C. Efstathiou,et al. A Peer-to-Peer Approach to Sharing Wireless Local Area Networks , 2006 .
[38] M.E. Steenstrup,et al. Opportunistic use of radio-frequency spectrum: a network perspective , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[39] L. Ma,et al. Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[40] Xuemin Shen,et al. HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management , 2008, IEEE Journal on Selected Areas in Communications.
[41] Jean-Pierre Hubaux,et al. Security and Cooperation in Wireless Networks , 2007, ESAS.
[42] Lata Narayanan,et al. Channel assignment and graph multicoloring , 2002 .
[43] Cristina Comaniciu,et al. Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[44] Charles W. Bostian,et al. COGNITIVE RADIOS WITH GENETIC ALGORITHMS: INTELLIGENT CONTROL OF SOFTWARE DEFINED RADIOS , 2004 .
[45] Yoav Shoham,et al. Combinatorial Auctions , 2005, Encyclopedia of Wireless Networks.
[46] A. Sahai,et al. Codes to unmask spectrum violators in cognitive radio systems , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[47] P. Bahl,et al. DSAP: a protocol for coordinated spectrum access , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[48] Markus Fiedler,et al. A Multi-Dimensional CAN Approach to CRN Routing , 2010 .
[49] Bernhard Walke,et al. Strategies for distributed QoS support in radio spectrum sharing , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[50] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[51] Kaigui Bian,et al. MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .
[52] William Stallings. Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .
[53] Geoffrey Ye Li,et al. Proactive Detection of Spectrum Holes in Cognitive Radio , 2009, 2009 IEEE International Conference on Communications.
[54] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[55] Frank H. P. Fitzek,et al. Defining 4G technology from the users perspective , 2006, IEEE Network.
[56] Haitao Zheng,et al. Distributed Rule-Regulated Spectrum Sharing , 2008, IEEE Journal on Selected Areas in Communications.
[57] Ian F. Akyildiz,et al. A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.
[58] R.W. Brodersen,et al. Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[59] E. Maasland,et al. Auction Theory , 2021, Springer Texts in Business and Economics.
[60] John M. Chapin,et al. COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - The Path to Market Success for Dynamic Spectrum Access Technology , 2007, IEEE Communications Magazine.
[61] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.