Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks
暂无分享,去创建一个
Zhu Han | Dusit Niyato | Husheng Li | Zhou Yuan | Ju Bin Song | D. Niyato | Zhu Han | J. Song | Husheng Li | Zhou Yuan
[1] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[2] Wenliang Du,et al. Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.
[3] Carlos A. Pomalaza-Raez,et al. Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[4] Gianluigi Ferrari,et al. Tight bounds and accurate approximations for DQPSK transmission bit error rate , 2004 .
[5] Husheng Li. Cooperative Spectrum Sensing via Belief Propagation in Spectrum-Heterogeneous Cognitive Radio Systems , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[6] Y. Zeng,et al. Reliability of Spectrum Sensing Under Noise and Interference Uncertainty , 2009, 2009 IEEE International Conference on Communications Workshops.
[7] William T. Freeman,et al. Understanding belief propagation and its generalizations , 2003 .
[8] Henry Tirri,et al. A Statistical Modeling Approach to Location Estimation , 2002, IEEE Trans. Mob. Comput..
[9] William A. Arbaugh,et al. Dynamic spectrum access in cognitive radio networks , 2006 .
[10] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[11] Ryan W. Thomas,et al. A Bayesian Game Analysis of Emulation Attacks in Dynamic Spectrum Access Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[12] Don H. Johnson,et al. Calculation of the Kullback-Leibler distance between point process models , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[13] A. Friedman. Foundations of modern analysis , 1970 .
[14] Hilbert J. Kappen,et al. Sufficient Conditions for Convergence of the Sum–Product Algorithm , 2005, IEEE Transactions on Information Theory.
[15] Han Yu,et al. Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.
[16] John W. Fisher,et al. Nonparametric belief propagation for self-localization of sensor networks , 2005, IEEE Journal on Selected Areas in Communications.
[17] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[18] Husheng Li,et al. Collaborative Spectrum Sensing in Cognitive Radio Vehicular Ad Hoc Networks: Belief Propagation on Highway , 2010, 2010 IEEE 71st Vehicular Technology Conference.
[19] John W. Fisher,et al. Loopy Belief Propagation: Convergence and Effects of Message Errors , 2005, J. Mach. Learn. Res..
[20] Ekram Hossain,et al. Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .
[21] Zhu Han,et al. Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[22] K. Ramchandran,et al. Detecting primary receivers for cognitive radio applications , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[23] Ben Y. Zhao,et al. Multi-channel Jamming Attacks using Cognitive Radios , 2007, 2007 16th International Conference on Computer Communications and Networks.
[24] Kaigui Bian,et al. MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .
[25] Venugopal V. Veeravalli,et al. Cooperative Spectrum Sensing and Detection for Cognitive Radio , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[26] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[27] Santhanakrishnan Anand,et al. Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.
[28] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[29] G. Jakimoski,et al. Denial-of-Service Attacks on Dynamic Spectrum Access Networks , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.
[30] S. Anand,et al. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[31] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.