Security Issues of Cognitive Radio Network
暂无分享,去创建一个
[1] Jaydip Sen,et al. A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks , 2013, ArXiv.
[2] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[3] Abbas Ali Sharifi,et al. Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach , 2016, IEEE Communications Letters.
[4] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[5] Shabnam Sodagari,et al. An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks , 2011, GameSec.
[6] Martin Johnston,et al. Defeating SSDF Attacks With Trusted Nodes Assistance in Cognitive Radio Networks , 2017, IEEE Sensors Letters.
[7] Leonardo Goratti,et al. A single iteration belief propagation algorithm to minimize the effects of primary user emulation attacks , 2016, 2016 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).
[8] Mainak Chatterjee,et al. Trust based channel preference in cognitive radio networks under collaborative selfish attacks , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[9] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..
[10] Qingqi Pei,et al. Neighbor Detection-Based Spectrum Sensing Algorithm in Distributed Cognitive Radio Networks , 2017 .
[11] Anjali Agarwal,et al. A survey on security in Cognitive Radio networks , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).
[12] Hongxing Wu,et al. Malicious user detection for wide-band cognitive radio networks , 2016, 2016 Asia-Pacific Microwave Conference (APMC).
[13] Li Zhu,et al. Two Types of Attacks against Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.
[14] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[15] Ali Jamshidi,et al. Defence against primary user emulation attack using statistical properties of the cognitive radio received power , 2017, IET Commun..
[16] Qusay H. Mahmoud,et al. Cognitive Networks: Towards Self-Aware Networks , 2007 .
[17] Guoru Ding,et al. Defending against Byzantine attack in cooperative spectrum sensing relying on a reliable reference , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
[18] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[19] Murat Dener,et al. Security Analysis in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[20] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..
[21] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[22] Sattar B. Sadkhan,et al. Cognitive radio network security status and challenges , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).
[23] Tongtong Li,et al. Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.
[24] Ting Peng,et al. Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks , 2016, 2016 International Conference on Computer, Information and Telecommunication Systems (CITS).
[25] Kaigui Bian,et al. MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .
[26] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[27] Liang Hu,et al. The Security of Physical Layer in Cognitive Radio Networks , 2014 .
[28] J. Morris Chang,et al. A layered approach to cognitive radio network security: A survey , 2014, Comput. Networks.