Cooperative Spectrum Sharing and Trust Management in IoT Networks
暂无分享,去创建一个
Laurent Njilla | Fatemeh Afghah | Charles A. Kamhoua | Alireza Shamsoshoara | F. Afghah | C. Kamhoua | L. Njilla | Alireza Shamsoshoara
[1] Fatemeh Afghah,et al. Distributed simultaneous wireless information and power transfer in multiuser amplify‐and‐forward ad hoc wireless networks , 2018, Int. J. Commun. Syst..
[2] Anthony Ephremides,et al. A reputation-based Stackelberg game approach for spectrum sharing with cognitive cooperation , 2013, 52nd IEEE Conference on Decision and Control.
[3] Abbas El Gamal,et al. Bounds on capacity and minimum energy-per-bit for AWGN relay channels , 2006, IEEE Transactions on Information Theory.
[4] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[5] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[6] H. Vincent Poor,et al. On the Secure Degrees of Freedom of Relaying With Half-Duplex Feedback , 2011, IEEE Transactions on Information Theory.
[7] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[8] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[9] E. Meulen,et al. Three-terminal communication channels , 1971, Advances in Applied Probability.
[10] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[11] Yousef Darmani,et al. Enhanced multi-route ad hoc on-demand distance vector routing , 2015, 2015 23rd Iranian Conference on Electrical Engineering.
[12] Elza Erkip,et al. A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.
[13] Fatemeh Afghah,et al. A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[14] Abolfazl Razi,et al. Distributed Cooperative Spectrum Sharing in UAV Networks Using Multi-Agent Reinforcement Learning , 2018, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[15] Chunsheng Xin,et al. A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks , 2011, Comput. Commun..
[16] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[17] Zhu Han,et al. Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.
[18] Sherali Zeadally,et al. A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks , 2017, International Journal of Wireless Information Networks.
[19] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[20] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[21] Sandeep Chennakeshu,et al. Secure information transmission for mobile radio , 2000, IEEE Communications Letters.
[22] Abolfazl Razi,et al. Cooperative Spectrum Leasing in Cognitive Radio Networks , 2014, 2014 National Wireless Research Collaboration Symposium.
[23] Reihaneh Safavi-Naini,et al. ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[24] Siddarama R. Patil,et al. A survey on spectrum sensing algorithms for cognitive radio , 2016, 2016 International Conference on Advances in Human Machine Interaction (HMI).
[25] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[26] Fatemeh Afghah,et al. A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[27] Aylin Yener,et al. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.
[28] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[29] Zhu Han,et al. Resource Allocation for Wireless Networks: Basics, Techniques, and Applications , 2008 .
[30] Sennur Ulukus,et al. Secrecy in Cooperative Relay Broadcast Channels , 2011, IEEE Trans. Inf. Theory.
[31] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[32] Yu Zhang,et al. AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks , 2016, IEEE Transactions on Mobile Computing.
[33] Edmundo Monteiro,et al. A survey on security attacks and countermeasures with primary user detection in cognitive radio networks , 2015, EURASIP J. Inf. Secur..
[34] Behnam Bahrak,et al. Security and Enforcement in Spectrum Sharing , 2014, Proceedings of the IEEE.
[35] Abhay Parekh,et al. Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.
[36] Klaus Moessner,et al. Enabling smart cities through a cognitive management framework for the internet of things , 2013, IEEE Communications Magazine.
[37] Octavia A. Dobre,et al. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[38] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[39] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[40] Fatemeh Afghah,et al. Optimal Relaying Beamforming in Multiple Access Broadcast Channel (MABC) Bidirectional Cognitive Radio Networks in Presence of Interferers , 2018, Int. J. Wirel. Inf. Networks.
[41] Sanjay K. Sharma,et al. Cognitive Radios : A Survey On Spectrum Sensing , Security and Spectrum Handoff , 2017 .
[42] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[43] Simon P. Anderson,et al. Stackelberg versus Cournot oligopoly equilibrium , 1992 .
[44] Fatemeh Afghah,et al. Spectrum sharing in cooperative cognitive radio networks: A matching game framework , 2015, 2015 49th Annual Conference on Information Sciences and Systems (CISS).
[45] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[46] Rabah Amir,et al. Stackelberg versus Cournot Equilibrium , 1999 .
[47] Ilyong Chung,et al. Spectrum mobility in cognitive radio networks , 2012, IEEE Communications Magazine.
[48] Fatemeh Afghah,et al. A hierarchical Stackelberg-coalition formation game theoretic framework for cooperative spectrum leasing , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[49] Hamid Aghvami,et al. Cognitive Machine-to-Machine Communications for Internet-of-Things: A Protocol Stack Perspective , 2015, IEEE Internet of Things Journal.
[50] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[51] Arumugam Nallanathan,et al. Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game , 2016, IEEE Transactions on Communications.
[52] Umberto Spagnolini,et al. Spectrum Leasing to Cooperating Secondary Ad Hoc Networks , 2008, IEEE Journal on Selected Areas in Communications.
[53] Abolfazl Razi,et al. Maximizing Energy Efficiency of Cognitive Wireless Sensor Networks With Constrained Age of Information , 2017, IEEE Transactions on Cognitive Communications and Networking.
[54] Biling Zhang,et al. Selective spectrum leasing in Internet of Things via Nash Bargaining Solutions , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[55] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[56] Nan Liu,et al. Secrecy capacity of the 2-2-1 gaussian MIMO wire-tap channel , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.
[57] Alireza Shamsoshoara. Ring Oscillator and its application as Physical Unclonable Function (PUF) for Password Management , 2019, ArXiv.
[58] Sherali Zeadally,et al. Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey , 2013, IEEE Communications Surveys & Tutorials.
[59] Michael Gastpar,et al. Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.
[60] Amit P. Sheth,et al. Internet of Things to Smart IoT Through Semantic, Cognitive, and Perceptual Computing , 2016, IEEE Intelligent Systems.
[61] Ian F. Akyildiz,et al. A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.
[62] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[63] Masoud Sabaei,et al. An Efficient Scheme to Motivate Cooperation in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).