Enhanced Throughput Performance under Primary User Emulation Attack in Cognitive Radio Networks by Optimal Threshold Selection Approach
暂无分享,去创建一个
[1] Abbas Ali Sharifi,et al. Secure cooperative spectrum sensing under primary user emulation attack in cognitive radio networks: Attack-aware threshold selection approach , 2016 .
[2] Mohammad Javad Saber,et al. Multiband Cooperative Spectrum Sensing for Cognitive Radio in the Presence of Malicious Users , 2016, IEEE Communications Letters.
[3] Alentattil Rajesh,et al. A simplified counter approach to primary user emulation attacks from secondary user perspective , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[4] Sanjay Dhar Roy,et al. Throughput performance under primary user emulation attack in cognitive radio networks , 2017, Int. J. Commun. Syst..
[5] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[6] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[7] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[8] Santhanakrishnan Anand,et al. Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.
[9] Sanjay Dhar Roy,et al. Performance of Cognitive Radio Network with Novel Hybrid Spectrum Access Schemes , 2016, Wirel. Pers. Commun..
[10] A. Anpalagan,et al. Throughput Analysis of Opportunistic Access Strategies in Hybrid Underlay—Overlay Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.
[11] Huseyin Arslan,et al. Cognitive Radio, Software Defined Radio, and Adaptive Wireless Systems (Signals and Communication Technology) , 2007 .
[12] Mohsen Guizani,et al. Securing cognitive radio networks against primary user emulation attacks , 2015, IEEE Network.
[13] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[14] H. Urkowitz. Energy detection of unknown deterministic signals , 1967 .
[15] Yonghong Zeng,et al. Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..
[16] Leonardo Goratti,et al. A single iteration belief propagation algorithm to minimize the effects of primary user emulation attacks , 2016, 2016 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).
[17] S. Anand,et al. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[18] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.