A mitigation strategy against malicious Primary User Emulation Attack in Cognitive Radio networks
暂无分享,去创建一个
[1] H. Kumar,et al. Malicious User Detection in Cognitive Radio , 2015 .
[2] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[3] Santhanakrishnan Anand,et al. Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.
[4] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[5] Caidan Zhao,et al. Anti-PUE Attack Base on the Transmitter Fingerprint Identification in Cognitive Radio , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[6] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[7] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[8] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[9] Han Yu,et al. Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.
[10] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[11] F. Riaz,et al. Vehicle-to-vehicle communication enhanced by cognitve approach and multi-radio technologies , 2012, 2012 International Conference on Emerging Technologies.
[12] Santhanakrishnan Anand,et al. Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.
[13] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[14] M. Imran,et al. White space optimization using memory enabled genetic algorithm in vehicular cognitive radio , 2013, 2012 IEEE 11th International Conference on Cybernetic Intelligent Systems (CIS).
[15] Yonghong Zeng,et al. A Review on Spectrum Sensing for Cognitive Radio: Challenges and Solutions , 2010, EURASIP J. Adv. Signal Process..
[16] Yong Guan,et al. A Framework for Cooperative In-Band Sensing in Cognitive Radio Network , 2010, 2010 Fifth IEEE Workshop on Networking Technologies for Software Defined Radio Networks (SDR).
[17] Imran Rashid,et al. Primary User Emulation attack and their mitigation strategies: A survey , 2013, 2013 2nd National Conference on Information Assurance (NCIA).
[18] Roshan Singh Thakur,et al. Attacks & Preventions of Cognitive Radio Network-A Survey , 2013 .
[19] S. Anand,et al. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[20] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .