Secure Distance Based Improved Leach Routing to Prevent Puea in Cognitive Radio Network
暂无分享,去创建一个
[1] Yuh-Ren Tsai,et al. Coverage-preserving routing protocols for randomly distributed wireless sensor networks , 2007, IEEE Transactions on Wireless Communications.
[2] Hammad Afzal,et al. Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach , 2019, Telecommun. Syst..
[3] Saima Zafar,et al. Mobility-Aware Hierarchical Clustering in Mobile Wireless Sensor Networks , 2019, IEEE Access.
[4] Shriraghavan Madbushi,et al. Trust Establishment in Chaotic Cognitive Environment to Improve Attack Detection Accuracy Under Primary User Emulation , 2018 .
[5] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[6] Sang Hyun Lee,et al. Enhanced Message-Passing Based LEACH Protocol for Wireless Sensor Networks , 2019, Sensors.
[7] Walid R. Ghanem,et al. Proposed particle swarm optimization approaches for detection and localization of the primary user emulation attack in cognitive radio networks , 2018, 2018 35th National Radio Science Conference (NRSC).
[8] Yongcheng Li,et al. Detecting Primary User Emulation Attack Based on Multipath Delay in Cognitive Radio Network , 2019 .
[9] O. P. Sahu,et al. Mitigating Primary User Emulation Attacks Using Analytical Model , 2019 .
[10] Usman Ahmad,et al. CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks , 2018, The Journal of Supercomputing.
[11] Weichao Wang,et al. Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding , 2013, J. Ubiquitous Syst. Pervasive Networks.
[12] Naima Kaabouch,et al. Security threats and countermeasures of MAC layer in cognitive radio networks , 2018, Ad Hoc Networks.
[13] Abbas Ali Sharifi,et al. Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach , 2018, Wirel. Networks.
[14] Abdellah Najid,et al. MS-routing-G i : routing technique to minimise energy consumption and packet loss in WSNs with mobile sink , 2018, IET Networks.
[15] Raju Dutta,et al. Improvement on LEACH Protocol in Wireless Sensor Networks , 2014 .
[16] Mee Hong Ling,et al. A Security-Enhanced Cluster Size Adjustment Scheme for Cognitive Radio Networks , 2019, IEEE Access.
[17] Hui-fang Chen,et al. On detecting primary user emulation attack using channel impulse response in the cognitive radio network , 2017, Frontiers of Information Technology & Electronic Engineering.
[18] S. K. Mohapatra,et al. Energy-efficient modified LEACH protocol for IoT application , 2018, IET Wirel. Sens. Syst..
[19] V. Vijayarangan,et al. Secure and reliable routing in cognitive radio networks , 2017, Wirel. Networks.
[20] G. Umamaheswari,et al. An Adaptive Learning-Based Attack Detection Technique for Mitigating Primary User Emulation in Cognitive Radio Networks , 2020, Circuits Syst. Signal Process..
[21] Nhan Nguyen-Thanh,et al. Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks , 2018, IEEE Transactions on Cognitive Communications and Networking.
[22] Ayman El-Sayed,et al. A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks , 2018, Int. J. Commun. Syst..
[23] Adnan Yousaf,et al. Performance Comparison of Various LEACH Protocols in Wireless Sensor Networks , 2019, 2019 IEEE 15th International Colloquium on Signal Processing & Its Applications (CSPA).