Securing cognitive radio networks
暂无分享,去创建一个
[1] P. Bahl,et al. DSAP: a protocol for coordinated spectrum access , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[2] Chang N. Zhang,et al. Integrated approach for fault tolerance and digital signature in RSA , 1999 .
[3] Olga Leon,et al. A new cross-layer attack to TCP in cognitive radio networks , 2009, 2009 Second International Workshop on Cross Layer Design.
[4] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[5] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[6] Sai Shankar Nandagopalan,et al. IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios , 2006, J. Commun..
[7] Witold Kinsner,et al. A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.
[8] Jorge Lobo,et al. Policy-based management of networked computing systems , 2005, IEEE Communications Magazine.
[9] R.W. Brodersen,et al. Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[10] Vipul Gupta,et al. Freeze-TCP: a true end-to-end TCP enhancement mechanism for mobile environments , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[11] Yuan Zhang,et al. Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[12] M.M. Buddhikot,et al. Passive Steady State RF Fingerprinting: A Cognitive Technique for Scalable Deployment of Co-Channel Femto Cell Underlays , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[13] Yunnan Wu,et al. KNOWS: Cognitive Radio Networks Over White Spaces , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[14] Eitan Altman,et al. A survey of TCP over ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[15] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[16] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[17] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[18] Zhongding Lei,et al. IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.
[19] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[20] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[21] Oriol Sallent,et al. A novel on-demand cognitive pilot channel enabling dynamic spectrum allocation , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[22] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[23] Milind M. Buddhikot,et al. DIMSUMnet: new directions in wireless networking using coordinated dynamic spectrum , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.