Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment
暂无分享,去创建一个
[1] Jeffrey H. Reed,et al. Outage probability based comparison of underlay and overlay spectrum sharing techniques , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[2] William Stallings. Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .
[3] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerailities and Protection Countermeasures: A Multi-dimensional Analysis and Assessment , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[4] Prasun Sinha,et al. Understanding TCP fairness over wireless LAN , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[5] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[6] D. Sicker,et al. Can Cognitive Radio Support Broadband Wireless Access? , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[7] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[8] J.M. Chapin,et al. Time-Limited Leases for Innovative Radios , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[9] Mika Ståhlberg. Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .
[10] L. Ma,et al. Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[11] J. A. Volpe. Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning Syst , 2001 .
[12] C. N. Mathur,et al. Security Issues in Cognitive Radio Networks , 2007 .
[13] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[14] Allen D. Householder,et al. Managing the Threat of Denial-of-Service Attacks , 2001 .
[15] Panagiotis Papadimitratos,et al. A bandwidth sharing approach to improve licensed spectrum utilization , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[16] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.
[17] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[18] T. Brown,et al. Potential Cognitive Radio Denial of Service Attacks and Remedies , 2007 .
[19] William Stallings Zhu,et al. Network Security Essentials : Applications and Standards , 2007 .
[20] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[21] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[22] Martin Heusse,et al. Performance anomaly of 802.11b , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[23] Acm Sigmobile. MobiHoc 2006 : proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, May 22-25, 2006, Florence, Italy , 2006 .