Uncoordinated frequency hopping scheme for defense against primary user emulation attack in cognitive radio networks
暂无分享,去创建一个
[1] Santhanakrishnan Anand,et al. Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.
[2] Srdjan Capkun,et al. Efficient uncoordinated FHSS anti-jamming communication , 2009, MobiHoc '09.
[3] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[4] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[5] S. Anand,et al. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[6] Paul W. Goldberg,et al. The Complexity of the Homotopy Method, Equilibrium Selection, and Lemke-Howson Solutions , 2010, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[7] R. Gibbons. Game theory for applied economists , 1992 .
[8] Ali Jamshidi,et al. Defence against primary user emulation attack using statistical properties of the cognitive radio received power , 2017, IET Commun..
[9] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[10] Han Yu,et al. Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.
[11] Karim Faez,et al. A non-cooperative game approach for power-aware MAC in ad hoc wireless networks , 2010, Comput. Commun..
[12] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[13] C. E. Lemke,et al. Equilibrium Points of Bimatrix Games , 1964 .
[14] Radha Poovendran,et al. A coding-theoretic approach for efficient message verification over insecure channels , 2009, WiSec '09.
[15] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[16] Peng Ning,et al. USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).
[17] Philippe Ciblat,et al. Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks , 2015, IEEE Transactions on Wireless Communications.
[18] Amir Ghasemi,et al. Spectrum sensing in cognitive radio networks: requirements, challenges and design trade-offs , 2008, IEEE Communications Magazine.
[19] Chunsheng Xin,et al. Detection of PUE Attacks in Cognitive Radio Networks Based on Signal Activity Pattern , 2014, IEEE Transactions on Mobile Computing.
[20] Walaa Hamouda,et al. Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and Applications , 2017, IEEE Communications Surveys & Tutorials.
[21] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.