Cooperative Spectrum Sharing and Trust Management in IoT Networks

[1]  Fatemeh Afghah,et al.  Distributed simultaneous wireless information and power transfer in multiuser amplify‐and‐forward ad hoc wireless networks , 2018, Int. J. Commun. Syst..

[2]  Anthony Ephremides,et al.  A reputation-based Stackelberg game approach for spectrum sharing with cognitive cooperation , 2013, 52nd IEEE Conference on Decision and Control.

[3]  Abbas El Gamal,et al.  Bounds on capacity and minimum energy-per-bit for AWGN relay channels , 2006, IEEE Transactions on Information Theory.

[4]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[5]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[6]  H. Vincent Poor,et al.  On the Secure Degrees of Freedom of Relaying With Half-Duplex Feedback , 2011, IEEE Transactions on Information Theory.

[7]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[8]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[9]  E. Meulen,et al.  Three-terminal communication channels , 1971, Advances in Applied Probability.

[10]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).

[11]  Yousef Darmani,et al.  Enhanced multi-route ad hoc on-demand distance vector routing , 2015, 2015 23rd Iranian Conference on Electrical Engineering.

[12]  Elza Erkip,et al.  A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.

[13]  Fatemeh Afghah,et al.  A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[14]  Abolfazl Razi,et al.  Distributed Cooperative Spectrum Sharing in UAV Networks Using Multi-Agent Reinforcement Learning , 2018, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[15]  Chunsheng Xin,et al.  A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks , 2011, Comput. Commun..

[16]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[17]  Zhu Han,et al.  Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.

[18]  Sherali Zeadally,et al.  A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks , 2017, International Journal of Wireless Information Networks.

[19]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[20]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[21]  Sandeep Chennakeshu,et al.  Secure information transmission for mobile radio , 2000, IEEE Communications Letters.

[22]  Abolfazl Razi,et al.  Cooperative Spectrum Leasing in Cognitive Radio Networks , 2014, 2014 National Wireless Research Collaboration Symposium.

[23]  Reihaneh Safavi-Naini,et al.  ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[24]  Siddarama R. Patil,et al.  A survey on spectrum sensing algorithms for cognitive radio , 2016, 2016 International Conference on Advances in Human Machine Interaction (HMI).

[25]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[26]  Fatemeh Afghah,et al.  A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[27]  Aylin Yener,et al.  Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.

[28]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[29]  Zhu Han,et al.  Resource Allocation for Wireless Networks: Basics, Techniques, and Applications , 2008 .

[30]  Sennur Ulukus,et al.  Secrecy in Cooperative Relay Broadcast Channels , 2011, IEEE Trans. Inf. Theory.

[31]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[32]  Yu Zhang,et al.  AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks , 2016, IEEE Transactions on Mobile Computing.

[33]  Edmundo Monteiro,et al.  A survey on security attacks and countermeasures with primary user detection in cognitive radio networks , 2015, EURASIP J. Inf. Secur..

[34]  Behnam Bahrak,et al.  Security and Enforcement in Spectrum Sharing , 2014, Proceedings of the IEEE.

[35]  Abhay Parekh,et al.  Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.

[36]  Klaus Moessner,et al.  Enabling smart cities through a cognitive management framework for the internet of things , 2013, IEEE Communications Magazine.

[37]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[38]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[39]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[40]  Fatemeh Afghah,et al.  Optimal Relaying Beamforming in Multiple Access Broadcast Channel (MABC) Bidirectional Cognitive Radio Networks in Presence of Interferers , 2018, Int. J. Wirel. Inf. Networks.

[41]  Sanjay K. Sharma,et al.  Cognitive Radios : A Survey On Spectrum Sensing , Security and Spectrum Handoff , 2017 .

[42]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[43]  Simon P. Anderson,et al.  Stackelberg versus Cournot oligopoly equilibrium , 1992 .

[44]  Fatemeh Afghah,et al.  Spectrum sharing in cooperative cognitive radio networks: A matching game framework , 2015, 2015 49th Annual Conference on Information Sciences and Systems (CISS).

[45]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[46]  Rabah Amir,et al.  Stackelberg versus Cournot Equilibrium , 1999 .

[47]  Ilyong Chung,et al.  Spectrum mobility in cognitive radio networks , 2012, IEEE Communications Magazine.

[48]  Fatemeh Afghah,et al.  A hierarchical Stackelberg-coalition formation game theoretic framework for cooperative spectrum leasing , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).

[49]  Hamid Aghvami,et al.  Cognitive Machine-to-Machine Communications for Internet-of-Things: A Protocol Stack Perspective , 2015, IEEE Internet of Things Journal.

[50]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[51]  Arumugam Nallanathan,et al.  Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game , 2016, IEEE Transactions on Communications.

[52]  Umberto Spagnolini,et al.  Spectrum Leasing to Cooperating Secondary Ad Hoc Networks , 2008, IEEE Journal on Selected Areas in Communications.

[53]  Abolfazl Razi,et al.  Maximizing Energy Efficiency of Cognitive Wireless Sensor Networks With Constrained Age of Information , 2017, IEEE Transactions on Cognitive Communications and Networking.

[54]  Biling Zhang,et al.  Selective spectrum leasing in Internet of Things via Nash Bargaining Solutions , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[55]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[56]  Nan Liu,et al.  Secrecy capacity of the 2-2-1 gaussian MIMO wire-tap channel , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.

[57]  Alireza Shamsoshoara Ring Oscillator and its application as Physical Unclonable Function (PUF) for Password Management , 2019, ArXiv.

[58]  Sherali Zeadally,et al.  Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey , 2013, IEEE Communications Surveys & Tutorials.

[59]  Michael Gastpar,et al.  Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.

[60]  Amit P. Sheth,et al.  Internet of Things to Smart IoT Through Semantic, Cognitive, and Perceptual Computing , 2016, IEEE Intelligent Systems.

[61]  Ian F. Akyildiz,et al.  A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.

[62]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[63]  Masoud Sabaei,et al.  An Efficient Scheme to Motivate Cooperation in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).