Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective
暂无分享,去创建一个
[1] N.R. Prasad. Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.
[2] Caidan Zhao,et al. Anti-PUE Attack Base on the Transmitter Fingerprint Identification in Cognitive Radio , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[3] Sanjeev Sharma,et al. Distributed Shared Spectrum Techniques for Cognitive Wireless Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Communication Networks.
[4] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
[5] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[6] Li Zhang,et al. Adaptive QoS-aware channel access scheme for Cognitive Radio networks , 2010, Int. J. Ad Hoc Ubiquitous Comput..
[7] Nikos A. Vlassis,et al. Collaborative Multiagent Reinforcement Learning by Payoff Propagation , 2006, J. Mach. Learn. Res..
[8] Keith M. Martin,et al. An Application-Oriented Framework for Wireless Sensor Network Key Establishment , 2008, Electron. Notes Theor. Comput. Sci..
[9] Gang Zhao,et al. An Efficient Multi-Agent Q-learning Method Based on Observing the Adversary Agent State Change , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[10] Song Han,et al. Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[11] Sarit Kraus,et al. Security in multiagent systems by policy randomization , 2006, AAMAS '06.
[12] Máire O'Neill,et al. Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[13] Wenliang Du,et al. Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.
[14] Marcelo Bagnulo,et al. Security for multipath TCP: a constructive approach , 2011, Int. J. Internet Protoc. Technol..
[15] Jim Dowling,et al. Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[16] Jin Wei,et al. Two-Tier Optimal-Cooperation Based Secure Distributed Spectrum Sensing for Wireless Cognitive Radio Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[17] T.X. Brown,et al. Hammer Model Threat Assessment of Cognitive Radio Denial of Service Attacks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[18] Farrukh Aslam Khan,et al. A survey of Intrusion Detection Systems for Wireless Sensor Networks , 2012, Int. J. Ad Hoc Ubiquitous Comput..
[19] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[20] Pawel A. Dmochowski,et al. Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform , 2010, 2010 Proceedings of the Fifth International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[21] Xianfu Chen,et al. Inter-cluster connection in cognitive wireless mesh networks based on intelligent network coding , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[22] Kaigui Bian,et al. Security vulnerabilities in IEEE 802.22 , 2008, WICON 2008.
[23] Zhu Han,et al. Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[24] K. J. Ray Liu,et al. Optimal power allocation strategy against jamming attacks using the Colonel Blotto game , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[25] Tongtong Li,et al. On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[26] Wang Weifang. Denial of service attacks in cognitive radio networks , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.
[27] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[28] Shamik Sengupta,et al. Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2011, IEEE Journal on Selected Areas in Communications.
[29] Leslie Pack Kaelbling,et al. Learning Policies for Partially Observable Environments: Scaling Up , 1997, ICML.
[30] Ren-Junn Hwang,et al. Privacy protection on Vehicular Ad hoc NETworks , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[31] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[32] David Grace,et al. Two-stage reinforcement-learning-based cognitive radio with exploration control , 2011, IET Commun..
[33] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[34] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[35] A.R. Hammons,et al. A common lexicon and design issues surrounding cognitive radio networks operating in the presence of jamming , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[36] Ana Galindo-Serrano,et al. Distributed Q-Learning for Aggregated Interference Control in Cognitive Radio Networks , 2010, IEEE Transactions on Vehicular Technology.
[37] Peter C. Mason,et al. Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[38] Olga León Abarca,et al. A new cross-layer attack to TCP in cognitive radio networks , 2009 .
[39] Ruoying Sun,et al. Q-ac: multiagent reinforcement learning with perception-conversion action , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[40] Li Zhu,et al. A New Random Number Generate Algorithm for Cognitive Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[41] G. Jakimoski,et al. Denial-of-Service Attacks on Dynamic Spectrum Access Networks , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.
[42] David Grace,et al. Cognitive radio with reinforcement learning applied to heterogeneous multicast terrestrial communication systems , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[43] Xingming Sun,et al. Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[44] Zhu Han,et al. Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[45] Ming-Yang Su. Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[46] Carl A. Gunter,et al. Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[47] Jeffrey H. Reed,et al. Power fingerprinting in SDR & CR integrity assessment , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[48] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[49] Mihaela van der Schaar,et al. Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications , 2010, IEEE Journal on Selected Areas in Communications.
[50] Carlos A. Pomalaza-Raez,et al. Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[51] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[52] Shamik Sengupta,et al. Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2010, 2010 IEEE International Conference on Communications.
[53] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[54] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[55] Yang Yang,et al. Reinforcement learning based spectrum-aware routing in multi-hop cognitive radio networks , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[56] K. J. Ray Liu,et al. Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[57] David Grace,et al. Cognitive radio spectrum sharing schemes with reduced spectrum sensing requirements , 2008 .
[58] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[59] Caidan Zhao,et al. A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.
[60] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[61] Richard S. Sutton,et al. Introduction to Reinforcement Learning , 1998 .
[62] David Grace,et al. Cognitive Radio with Reinforcement Learning Applied to Multicast Downlink Transmission and Distributed Occupancy Detection , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[63] Zhu Han,et al. Dogfight in Spectrum: Jamming and Anti-Jamming in Multichannel Cognitive Radio Systems , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[64] Haiming Wang,et al. Eigenvalues based spectrum sensing against untrusted users in cognitive radio networks , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[65] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[66] Sandip Sen,et al. Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks , 2011, Comput. J..
[67] Mihaela van der Schaar,et al. Learning to Compete for Resources in Wireless Stochastic Games , 2009, IEEE Transactions on Vehicular Technology.
[68] Kok-Lim Alvin Yau,et al. Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning , 2010, IEEE Local Computer Network Conference.
[69] Kok-Lim Alvin Yau,et al. Achieving Efficient and Optimal Joint Action in Distributed Cognitive Radio Networks Using Payoff Propagation , 2010, 2010 IEEE International Conference on Communications.
[70] Sarit Kraus,et al. Coordinating Randomized Policies for Increasing Security in Multiagent Systems , 2009, Safety and Security in Multiagent Systems.
[71] Vojislav B. Misic,et al. Improving sensing accuracy in cognitive PANs through modulation of sensing probability , 2009 .
[72] S. Ford,et al. Using POMDP-based state estimation to enhance agent system survivability , 2005, IEEE 2nd Symposium on Multi-Agent Security and Survivability, 2005..