A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks
暂无分享,去创建一个
[1] Máire O'Neill,et al. Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[2] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[3] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[4] Genshe Chen,et al. Performance evaluation of distributed compressed wideband sensing for cognitive radio networks , 2008, 2008 11th International Conference on Information Fusion.
[5] N.R. Prasad. Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.
[6] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[7] Stephen Dean Brown. FPGA Architectural Research: A Survey , 1996, IEEE Des. Test Comput..
[8] Zhu Han,et al. CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[9] Zhongding Lei,et al. IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.
[10] Kaushik R. Chowdhury,et al. A survey on MAC protocols for cognitive radio networks , 2009, Ad Hoc Networks.
[11] Alexandros G. Fragkiadakis,et al. Anomaly-Based Intrusion Detection Algorithms for Wireless Networks , 2010, WWIC.
[12] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[13] Brian Choi,et al. Distributed Spectrum Sensing for Cognitive Radio Systems , 2007, 2007 Information Theory and Applications Workshop.
[14] Kyutae Lim,et al. First Cognitive Radio Networking Standard for Personal/Portable Devices in TV White Spaces , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[15] Markus Fiedler,et al. Misbehavior Scenarios in Cognitive Radio Networks , 2010, Future Internet.
[16] Ananthram Swami,et al. Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework , 2007, IEEE Journal on Selected Areas in Communications.
[17] Xiaohua Li,et al. Secure transmission power of cognitive radios for dynamic spectrum access applications , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[18] Jiann-Liang Chen,et al. Reconfigurable Software Defined Radio and Its Applications , 2010 .
[19] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[20] Chien-Chung Shen,et al. Single-Radio Adaptive Channel Algorithm for Spectrum Agile Wireless Ad Hoc Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[21] Husheng Li,et al. Defending against Hit-and-Run Attackers in Collaborative Spectrum Sensing of Cognitive Radio Networks: A Point System , 2010, 2010 IEEE 71st Vehicular Technology Conference.
[22] Ladimer S. Nagurney. Software defined radio in the electrical and computer engineering curriculum , 2009, 2009 39th IEEE Frontiers in Education Conference.
[23] Gernot Heiser. Virtualization for Embedded Systems , 2007 .
[24] Ying Wang,et al. Cognitive Radio: From Spectrum Sharing to Adaptive Learning and Reconfiguration , 2008, 2008 IEEE Aerospace Conference.
[25] Shamik Sengupta,et al. Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2010, 2010 IEEE International Conference on Communications.
[26] V.R. Petty,et al. KUAR: A Flexible Software-Defined Radio Development Platform , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[27] Wei Yuan,et al. Threshold-Learning in Local Spectrum Sensing of Cognitive Radio , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[28] Mohamed-Slim Alouini,et al. Empirical results for wideband multidimensional spectrum usage , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[29] Neeraj Jaggi,et al. MAC layer misbehavior effectiveness and collective aggressive reaction approach , 2010, 2010 IEEE Sarnoff Symposium.
[30] Santhanakrishnan Anand,et al. Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.
[31] Ryuji Kohno,et al. Security Issues for Software Defined Radio : Design of a Secure Download System(Special Issue on Software Defined Radio Technology and Its Applications) , 2002 .
[32] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..
[33] S. Besen. THE EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE: A PRELIMINARY ANALYSIS , 1990 .
[34] T. C. Aysal,et al. Cooperative Spectrum Sensing with Noisy Hard Decision Transmissions , 2009, 2009 IEEE International Conference on Communications.
[35] Ryuji Kohno,et al. A proposal of architectural elements for implementing secure software download service in software defined radio , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[36] John S. Baras,et al. Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments , 2009, IEEE/ACM Transactions on Networking.
[37] David K. Chiabi. European Telecommunications Standards Institute , 2015 .
[38] K. P. Subbalakshmi,et al. Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[39] Michael Gastpar,et al. On Capacity Under Receive and Spatial Spectrum-Sharing Constraints , 2007, IEEE Transactions on Information Theory.
[40] B. Farhang-Boroujeny,et al. An Experimental Cognitive Radio for First Responders , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[41] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[42] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[43] Joseph Mitola. Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..
[44] Santhanakrishnan Anand,et al. Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.
[45] E. Jones. Software Defined Radios, Cognitive Radio and the Software Communications Architecture (SCA) in relation to COMMS, radar and ESM , 2008 .
[46] Friedrich Jondral,et al. Software-Defined Radio—Basics and Evolution to Cognitive Radio , 2005, EURASIP J. Wirel. Commun. Netw..
[47] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[48] Douglas M. Blough,et al. Securing the download of radio configuration files for software defined radio devices , 2004, MobiWac '04.
[49] Kang G. Shin,et al. In-band spectrum sensing in cognitive radio networks: energy detection or feature detection? , 2008, MobiCom '08.
[50] Carlos A. Pomalaza-Raez,et al. Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[51] Raj Jain,et al. A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems , 1998, ArXiv.
[52] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[53] Martine Villegas,et al. Analysis of spectrum utilization in suburb environment—evaluation of potentials for cognitive radio , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.
[54] Yunfei Chen. Collaborative spectrum sensing in the presence of secondary user interferences for lognormal shadowing , 2012, Wirel. Commun. Mob. Comput..
[55] Petri Mähönen,et al. Lessons Learned from an Extensive Spectrum Occupancy Measurement Campaign and a Stochastic Duty Cycle Model , 2009, 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops.
[56] Teng Joon Lim,et al. Cooperative Quickest Spectrum Sensing in Cognitive Radios with Unknown Parameters , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[57] Kaigui Bian,et al. MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .
[58] Sai Shankar Nandagopalan,et al. IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios , 2006, J. Commun..
[59] G.J.M. Smit,et al. A Reconfigurable Radio Architecture for Cognitive Radio in Emergency Networks , 2006, 2006 European Conference on Wireless Technology.
[60] Kang G. Shin,et al. Attack-tolerant distributed sensing for dynamic spectrum access networks , 2009, 2009 17th IEEE International Conference on Network Protocols.
[61] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[62] Alexandros G. Fragkiadakis,et al. Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype , 2012, EURASIP J. Wirel. Commun. Netw..
[63] Jung-Min Park,et al. Tamper Resistance for Software Defined Radio Software , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[64] Ryuji Kohno,et al. Secure download system based on software defined radio composed of FPGAs , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[65] Timothy J. O'Shea,et al. Applications of Machine Learning to Cognitive Radio Networks , 2007, IEEE Wireless Communications.
[66] Dirk Grunwald,et al. A Software Defined Radio Application Utilizing Modern FPGAs and NoC Interconnects , 2007, 2007 International Conference on Field Programmable Logic and Applications.
[67] Sheila E. Frankel,et al. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .
[68] Shuguang Cui,et al. Optimal Linear Cooperation for Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.
[69] Zhu Han,et al. Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[70] Chittabrata Ghosh,et al. Secure Communication in Cognitive Radio Networks , 2022 .
[71] John J. Fitton. SECURITY CONSIDERATIONS FOR SOFTWARE DEFINED RADIOS , 2002 .
[72] Ryuji Kohno,et al. A framework for secure download for software-defined radio , 2002 .
[73] Pramod K. Varshney,et al. Countering byzantine attacks in cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[74] Xuemin Shen,et al. HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management , 2008, IEEE Journal on Selected Areas in Communications.
[75] Russell Tessier,et al. FPGA Architecture: Survey and Challenges , 2008, Found. Trends Electron. Des. Autom..
[76] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[77] Murat Çakiroglu,et al. Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.
[78] Husheng Li,et al. Cross-Layer Attack and Defense in Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[79] Maxim Raya,et al. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.
[80] Xianming Qing,et al. Spectrum Survey in Singapore: Occupancy Measurements and Analyses , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[81] T.X. Brown,et al. Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[82] C. Cordeiro,et al. C-MAC: A Cognitive MAC Protocol for Multi-Channel Wireless Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[83] Kaigui Bian,et al. Security vulnerabilities in IEEE 802.22 , 2008, WICON 2008.
[84] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[85] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[86] Hazem H. Refai,et al. A Frequency Agile Implementation for IEEE 802.22 Using Software Defined Radio Platform , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[87] Hiroshi Harada. A small-size software defined cognitive radio prototype , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[88] Niraj K. Jha,et al. An architecture for secure software defined radio , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.
[89] Peter C. Mason,et al. Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[90] Robert G. Cole,et al. Voice over IP performance monitoring , 2001, CCRV.
[91] Geethapriya Thamilarasu,et al. A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[92] Juan Hernández-Serrano,et al. Modeling the Lion Attack in Cognitive Radio Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[93] Dirk Grunwald,et al. MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs , 2006, MobiSys '06.
[94] Zhu Han,et al. Collaborative spectrum sensing from sparse observations using matrix completion for cognitive radio networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[95] John A. Copeland,et al. An anti-cloning framework for software defined radio mobile devices , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[96] William M. Campbell,et al. BIOMETRICALLY ENHANCED SOFTWARE-DEFINED RADIOS , 2003 .
[97] Bin Shen,et al. Optimal Linear Soft Fusion Schemes for Cooperative Sensing in Cognitive Radio Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[98] Feng Zhu,et al. Enhanced robust cooperative spectrum sensing in cognitive radio , 2009, Journal of Communications and Networks.
[99] Zhu Han,et al. Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[100] Vijay K. Bhargava,et al. OMC-MAC: An Opportunistic Multichannel MAC for Cognitive Radio Networks , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.
[101] Ranjan K. Mallik,et al. Cooperative Spectrum Sensing Optimization in Cognitive Radio Networks , 2008, 2008 IEEE International Conference on Communications.
[102] Li Zhu,et al. Two Types of Attacks against Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.
[103] Mohamed-Slim Alouini,et al. On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.
[104] L. Van der Perre,et al. Receiver Architectures for Software-defined Radios in Mobile Terminals: the Path to Cognitive Radios , 2007, 2007 IEEE Radio and Wireless Symposium.
[105] Sanjay Jha,et al. Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[106] Catherine K. Murphy. Combining belief functions when evidence conflicts , 2000, Decis. Support Syst..
[107] Yi Zheng,et al. Cooperative Spectrum Sensing Based on SNR Comparison in Fusion Center for Cognitive Radio , 2009, 2009 International Conference on Advanced Computer Control.
[108] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[109] Kang G. Shin,et al. OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.
[110] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[111] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[112] Insoo Koo,et al. An enhanced cooperative spectrum sensing scheme based on evidence theory and reliability source evaluation in cognitive radio context , 2009, IEEE Communications Letters.