Mitigation of primary user emulation attack in cognitive radio for secured medical body area networks
暂无分享,去创建一个
[1] Máire O'Neill,et al. Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[2] Jie Wu,et al. Efficient SINR Estimating with Accuracy Control in Large Scale Cognitive Radio Networks , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[3] Loukas Lazos,et al. A Primary User authentication system for mobile cognitive radio networks , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).
[4] Ying-Chang Liang,et al. A retransmission-based scheme for video streaming over wireless channels , 2010, CMC 2010.
[5] Shuai Li,et al. Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.
[6] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[7] Lei Ying,et al. Limited feedback for cognitive radio networks using compressed sensing , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[8] Weihua Zhuang,et al. Simple Channel Sensing Order in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.
[9] Deepraj S Vernekar,et al. AN INVESTIGATION OF SECURITY CHALLENGES IN COGNITIVE RADIO NETWORKS , 2012 .
[10] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[11] Feng Lin,et al. Cognitive radio network as wireless sensor network (II): Security consideration , 2011, Proceedings of the 2011 IEEE National Aerospace and Electronics Conference (NAECON).
[12] Yu-Dong Yao,et al. Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.
[13] Miguel Soriano,et al. Securing cognitive radio networks , 2010 .
[14] K. J. Ray Liu,et al. Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.
[15] Jianfeng Wang,et al. Emerging cognitive radio applications: A survey , 2011, IEEE Communications Magazine.
[16] Khaled Ben Letaief,et al. Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.