An Improved Security Mechanism in Cognitive Radio Networks
暂无分享,去创建一个
Huayi Wu | Baohua Bai | Huayi Wu | Baohua Bai
[1] Ray Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[2] Ari Juels,et al. $evwu Dfw , 1998 .
[3] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[4] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[5] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[6] I Chih-Lin,et al. Wireless Communications and Networks , 2004 .
[7] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[8] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[9] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[10] Li Zhu,et al. Two Types of Attacks against Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.
[11] Shilpa Achaliya,et al. Cognitive radio , 2010 .
[12] Xianwei Zhou,et al. Puzzle-based selfish behavior punishment mechanism of MAC layer in cognitive radio networks , 2010 .
[13] Kaigui Bian,et al. MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .