Sustenance against RL-Based Sybil Attacks in Cognitive Radio Networks Using Dynamic Reputation System
暂无分享,去创建一个
[1] Kaushik R. Chowdhury,et al. Common control channel design for cognitive radio wireless ad hoc networks using adaptive frequency hopping , 2010, Ad Hoc Networks.
[2] Kai Hong,et al. Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense , 2011, 2011 IEEE International Conference on Communications (ICC).
[3] Brian M. Sadler,et al. COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - Dynamic Spectrum Access in the Time Domain: Modeling and Exploiting White Space , 2007, IEEE Communications Magazine.
[4] Kai Hong,et al. Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure? , 2011, 2011 IEEE International Conference on Communications (ICC).
[5] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[6] Shamik Sengupta,et al. Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2010, 2010 IEEE International Conference on Communications.
[7] Kai Hong,et al. Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[8] A. C. Sumathi,et al. Security in cognitive radio networks - a survey , 2012, 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA).
[9] T. Ulversoy,et al. Software Defined Radio: Challenges and Opportunities , 2010, IEEE Communications Surveys & Tutorials.
[10] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[11] Cheng Li,et al. The security in cognitive radio networks: a survey , 2009, IWCMC.