Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio networks
暂无分享,去创建一个
L. Kalaivani | R. Varatharajan | Xiao-Zhi Gao | S. Vimal | A. Suresh | M. Kaliappan | M. Kaliappan | L. Kalaivani | R. Varatharajan | S. Vimal | X. Gao | A. Suresh
[1] R. Varatharajan,et al. CEMulti-core Architecture for Optimization of Energy over Heterogeneous Environment with High Performance Smart Sensor Devices , 2018, Wirel. Pers. Commun..
[2] Aslam Durvesh,et al. Detection of Multiple Selfish Attack Nodes in Cognitive Radio : a Review , 2016 .
[3] P. Subbulakshmi,et al. Optimization using Artificial Bee Colony based clustering approach for big data , 2018, Cluster Computing.
[4] Bo Ai,et al. Finite-state Markov channel modeling for vehicle-to-infrastructure communications , 2014, 2014 IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014).
[5] Jong Min Kim,et al. Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks , 2016, J. Sensors.
[6] S. Vimal,et al. SECURE DATA PACKET TRANSMISSION IN MANET USING ENHANCED IDENTITY-BASED CRYPTOGRAPHY (EIBC) , 2016 .
[7] Jaydip Sen,et al. A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks , 2013, ArXiv.
[8] Miguel González-Mendoza,et al. Wireless Channel Model with Markov Chains Using MATLAB , 2012 .
[9] Dimitri P. Bertsekas,et al. Dynamic Programming and Optimal Control, Two Volume Set , 1995 .
[10] Tongtong Li,et al. Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[11] Xiangyun Zhou,et al. Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.
[12] C. Van Hoof,et al. Micropower energy harvesting , 2009, ESSDERC 2009.
[13] P. Subbulakshmi,et al. Honest Auction Based Spectrum Assignment and Exploiting Spectrum Sensing Data Falsification Attack Using Stochastic Game Theory in Wireless Cognitive Radio Network , 2018, Wirel. Pers. Commun..
[14] Juebo Wu,et al. Research and Analysis on Cognitive Radio Network Security , 2012 .
[15] Xi-Ren Cao,et al. Partially Observable Markov Decision Processes With Reward Information: Basic Ideas and Models , 2007, IEEE Transactions on Automatic Control.
[16] Liang Xiao,et al. Game-Theoretic Approach against Selfish Attacks in Cognitive Radio Networks , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.
[17] Shriraghavan Madbushi,et al. Trust Establishment in Chaotic Cognitive Environment to Improve Attack Detection Accuracy Under Primary User Emulation , 2018 .
[18] Aslam Durvesh,et al. Research Paper on Detection of Multiple Selfish Attack Nodes Using RSA in Cognitive Radio , 2016 .
[19] S. Thylashri,et al. Vitality and peripatetic sustain cluster key management schemes in MANET , 2018 .
[20] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[21] Bhaskar Krishnamachari,et al. On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance , 2007, IEEE Transactions on Wireless Communications.
[22] Danda B. Rawat,et al. Recent security issues on cognitive radio networks: A survey , 2016, SoutheastCon 2016.
[23] Hanna Bogucka,et al. Energy-Efficient Cooperative Spectrum Sensing: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[24] A. Suresh,et al. Predictive big data analytic on demonetization data using support vector machine , 2018, Cluster Computing.
[25] George K. Karagiannidis,et al. On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.
[26] Hwee Pink Tan,et al. Empirical modeling of a solar-powered energy harvesting wireless sensor node for time-slotted operation , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[27] Moslem Amiri,et al. Measurements of energy consumption and execution time of different operations on Tmote Sky sensor nodes , 2010 .
[28] Cheng Wu,et al. Energy-efficiency opportunistic spectrum allocation in cognitive wireless sensor network , 2018, EURASIP J. Wirel. Commun. Netw..
[29] Sungsoo Park,et al. Optimal Spectrum Access for Energy Harvesting Cognitive Radio Networks , 2013, IEEE Transactions on Wireless Communications.
[30] L. Kalaivani,et al. Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks , 2017, Cluster Computing.
[31] Yang Qin,et al. An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors , 2012, Comput. Networks.
[32] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[33] Hadeel S. Abed,et al. Improvement of energy consumption in cognitive radio by reducing the number of sensed samples , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).
[34] Hong Shen Wang,et al. Finite-state Markov channel-a useful model for radio communication channels , 1995 .
[35] Hemlata Patil,et al. Energy-Decisive and Upgrade Cooperative Spectrum Sensing in Cognitive Radio Networks , 2016 .