The Security of Physical Layer in Cognitive Radio Networks
暂无分享,去创建一个
Liang Hu | Hongtu Li | Jianfeng Chu | Fangming Wu | Yuan-mo Zhang | Yi-cheng Yu | Liang Hu | Hongtu Li | Jian-feng Chu | Yi-cheng Yu | Yuan-mo Zhang | Fangming Wu
[1] Gyanendra Prasad Joshi,et al. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends , 2013, Sensors.
[2] Ramjee Prasad,et al. Deployment of Cognitive Radio in India , 2014, Wirel. Pers. Commun..
[3] Sajal K. Das,et al. Coordination problem in cognitive wireless mesh networks , 2013, Pervasive Mob. Comput..
[4] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[5] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[6] Lu Zhang,et al. Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.
[7] Cheng Yang,et al. The Coverage Analysis of Cognitive Radio Network , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[8] Santhanakrishnan Anand,et al. Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.
[9] Guangyue Lu,et al. Social Incentives for Cooperative Spectrum Sensing in Distributed Cognitive Radio Networks , 2014, KSII Trans. Internet Inf. Syst..
[10] Qihui Wu,et al. Joint spectrum sensing and transmit power adaptation in interference-aware cognitive radio networks , 2014, Trans. Emerg. Telecommun. Technol..
[11] Ying-Chang Liang,et al. Cognitive radio network architecture: part I -- general structure , 2008, ICUIMC '08.
[12] Roberto Di Pietro,et al. Jamming mitigation in cognitive radio networks , 2013, IEEE Network.
[13] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[14] Prasant Mohapatra,et al. Hearing is believing: Detecting mobile primary user emulation attack in white space , 2011, 2011 Proceedings IEEE INFOCOM.
[15] Apurva N. Mody,et al. Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[16] Xiaofu Ma,et al. Practical Issues for Spectrum Management With Cognitive Radios , 2014, Proceedings of the IEEE.
[17] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[18] Ruoshan Kong,et al. Distributed and Centralized Schemes for Channel Sensing Order Setting in Multi-user Cognitive Radio Networks , 2014, Wirel. Pers. Commun..
[19] Olga León Abarca,et al. Securing cognitive radio networks , 2010 .
[20] Yuan Shi,et al. Detecting Primary User Emulation Attack in Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[21] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[22] Kouichi Sakurai,et al. A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[23] Zhu Han,et al. Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[24] David Fernandes Cruz Moura,et al. Anti-jamming defense mechanism in cognitive radios networks , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[25] Ben Y. Zhao,et al. Multi-channel Jamming Attacks using Cognitive Radios , 2007, 2007 16th International Conference on Computer Communications and Networks.
[26] Sajad Sadough,et al. Spectrum Sensing for Cognitive Radio Networks Based on Blind Source Separation , 2013, KSII Trans. Internet Inf. Syst..
[27] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[28] Juan Rico,et al. Resource management for QoS support in cognitive radio networks , 2014, IEEE Communications Magazine.
[29] Chunsheng Xin,et al. Detection of PUE Attacks in Cognitive Radio Networks Based on Signal Activity Pattern , 2014, IEEE Transactions on Mobile Computing.
[30] Carlo S. Regazzoni,et al. Comparison among Cognitive Radio Architectures for Spectrum Sensing , 2011, EURASIP J. Wirel. Commun. Netw..
[31] Qusay H. Mahmoud,et al. Cognitive Networks: Towards Self-Aware Networks , 2007 .
[32] Sisi Liu,et al. Thwarting inside jamming attacks on wireless broadcast communications , 2011, WiSec '11.
[33] R.W. Brodersen,et al. Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[34] Ping Zhang,et al. Cognitive information metrics for cognitive wireless networks , 2014 .
[35] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[36] Kranthimanoj Nagothu,et al. A Beamforming Approach to Smart Grid Systems Based on Cloud Cognitive Radio , 2014, IEEE Systems Journal.
[37] Mainak Chatterjee,et al. Collaborative jamming and collaborative defense in cognitive radio networks , 2013, Pervasive Mob. Comput..
[38] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[39] Shuguang Cui,et al. On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[40] Miguel Soriano,et al. Securing cognitive radio networks , 2010, Int. J. Commun. Syst..