Security Issues in Cognitive Radio Networks
暂无分享,去创建一个
[1] L. Kleinrock,et al. Packet Switching in Radio Channels : Part Il-The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution , 2022 .
[2] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[3] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[4] Joseph Mitola,et al. The software radio architecture , 1995, IEEE Commun. Mag..
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] Marek Natkaniec,et al. An analysis of the backoff mechanism used in IEEE 802.11 networks , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.
[7] Herbert Gintis,et al. Game Theory Evolving: A Problem-Centered Introduction to Modeling Strategic Interaction - Second Edition , 2009 .
[8] Jesse Walker,et al. Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .
[9] Harold Houba. Game Theory Evolving: a Problem-centered Introduction to Modeling Stratgeic Behavior [Review of: H. Gintis (2000) Game Theory Evolving: a Problem-centered Introduction to Modeling Strategic Behavior] , 2001 .
[10] David G. Messerschmitt,et al. The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks , 2001, MMNS.
[11] Joseph Mitola. Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..
[12] Ram Ramanathan,et al. On the scalability of ad hoc routing protocols , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[13] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[14] Mark Allman,et al. On making TCP more robust to packet reordering , 2002, CCRV.
[15] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[16] Bart Preneel,et al. A Concrete Security Analysis for 3GPP-MAC , 2003, FSE.
[17] Markus Jakobsson,et al. Stealth attacks on ad-hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[18] Russ Housley,et al. Security flaws in 802.11 data link protocols , 2003, CACM.
[19] Bruce Schneier,et al. Practical cryptography , 2003 .
[20] Dan Zhou. Security issues in ad hoc networks , 2003 .
[21] R.W. Brodersen,et al. Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[22] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[23] E. Visotsky,et al. On collaborative detection of TV transmissions in support of dynamic spectrum sharing , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[24] Danijela Cabric,et al. Physical layer design issues unique to cognitive radio systems , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.
[25] Milind M. Buddhikot,et al. DIMSUMnet: new directions in wireless networking using coordinated dynamic spectrum , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[26] C. Cordeiro,et al. IEEE 802.22: the first worldwide wireless standard based on cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[27] D. Raychaudhuri,et al. Spectrum co-existence of IEEE 802.11b and 802.16a networks using the CSCC etiquette protocol , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[28] Rajarathnam Chandramouli,et al. Robust encryption for secure image transmission over wireless channels , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[29] K. Ramchandran,et al. Detecting primary receivers for cognitive radio applications , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[30] Abhay Parekh,et al. Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.
[31] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[32] Salil S. Kanhere,et al. NIS07-5: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks , 2006, IEEE Globecom 2006.
[33] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[34] K. P. Subbalakshmi,et al. Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[35] Koduvayur P. Subbalakshmi,et al. Dynamic Spectrum Access with QoS and Interference Temperature Constraints , 2007, IEEE Trans. Mob. Comput..
[36] Rajarathnam Chandramouli,et al. Dynamic Spectrum Access with QoS and Interference Temperature Constraints , 2007, IEEE Transactions on Mobile Computing.
[37] K. P. Subbalakshmi,et al. A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices , 2007, Int. J. Netw. Secur..
[38] Mohamed-Slim Alouini,et al. On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.
[39] Zhou Xianwei,et al. Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008 .