Multi-fusion Based Distributed Spectrum Sensing against Data Falsification Attacks and Byzantine Failures in CR-MANET
暂无分享,去创建一个
[1] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[2] Dharma P. Agrawal,et al. Spectrum occupancy validation and modeling using real-time measurements , 2010, CoRoNet '10.
[3] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[4] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[5] Zhu Han,et al. Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.
[6] Li Xiao,et al. Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks , 2011, SecureComm.
[7] Zhu Han,et al. Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[8] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[9] Ralph B. D'Agostino,et al. Simulation probability points of b2 for small samples , 1971 .
[10] Ian F. Akyildiz,et al. CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.
[11] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[12] Teri A. Crosby,et al. How to Detect and Handle Outliers , 1993 .
[13] Kaigui Bian,et al. Robustness against Byzantine Failures in Distributed Spectrum Sensing , 2012, Comput. Commun..
[14] Kang G. Shin,et al. Secure cooperative spectrum sensing in cognitive radio networks using interference signatures , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[15] Otto Carlos Muniz Bandeira Duarte,et al. Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.
[16] W. R. Buckland,et al. Outliers in Statistical Data , 1979 .
[17] Pramod K. Varshney,et al. Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.
[18] Danijela Cabric,et al. Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.
[19] Peng Ning,et al. A Byzantine attack defender: The Conditional Frequency Check , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.