Securing cognitive radio networks

[1]  P. Bahl,et al.  DSAP: a protocol for coordinated spectrum access , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[2]  Chang N. Zhang,et al.  Integrated approach for fault tolerance and digital signature in RSA , 1999 .

[3]  Olga Leon,et al.  A new cross-layer attack to TCP in cognitive radio networks , 2009, 2009 Second International Workshop on Cross Layer Design.

[4]  Jack L. Burbank,et al.  Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[5]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[6]  Sai Shankar Nandagopalan,et al.  IEEE 802.22: An Introduction to the First Wireless Standard based on Cognitive Radios , 2006, J. Commun..

[7]  Witold Kinsner,et al.  A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.

[8]  Jorge Lobo,et al.  Policy-based management of networked computing systems , 2005, IEEE Communications Magazine.

[9]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[10]  Vipul Gupta,et al.  Freeze-TCP: a true end-to-end TCP enhancement mechanism for mobile environments , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[11]  Yuan Zhang,et al.  Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[12]  M.M. Buddhikot,et al.  Passive Steady State RF Fingerprinting: A Cognitive Technique for Scalable Deployment of Co-Channel Femto Cell Underlays , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[13]  Yunnan Wu,et al.  KNOWS: Cognitive Radio Networks Over White Spaces , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[14]  Eitan Altman,et al.  A survey of TCP over ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[15]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[16]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[17]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[18]  Zhongding Lei,et al.  IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.

[19]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[20]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[21]  Oriol Sallent,et al.  A novel on-demand cognitive pilot channel enabling dynamic spectrum allocation , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[22]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[23]  Milind M. Buddhikot,et al.  DIMSUMnet: new directions in wireless networking using coordinated dynamic spectrum , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.