Security Issues in Cognitive Radio Networks

[1]  L. Kleinrock,et al.  Packet Switching in Radio Channels : Part Il-The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution , 2022 .

[2]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[3]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[4]  Joseph Mitola,et al.  The software radio architecture , 1995, IEEE Commun. Mag..

[5]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[6]  Marek Natkaniec,et al.  An analysis of the backoff mechanism used in IEEE 802.11 networks , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.

[7]  Herbert Gintis,et al.  Game Theory Evolving: A Problem-Centered Introduction to Modeling Strategic Interaction - Second Edition , 2009 .

[8]  Jesse Walker,et al.  Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .

[9]  Harold Houba Game Theory Evolving: a Problem-centered Introduction to Modeling Stratgeic Behavior [Review of: H. Gintis (2000) Game Theory Evolving: a Problem-centered Introduction to Modeling Strategic Behavior] , 2001 .

[10]  David G. Messerschmitt,et al.  The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks , 2001, MMNS.

[11]  Joseph Mitola Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..

[12]  Ram Ramanathan,et al.  On the scalability of ad hoc routing protocols , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[13]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[14]  Mark Allman,et al.  On making TCP more robust to packet reordering , 2002, CCRV.

[15]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[16]  Bart Preneel,et al.  A Concrete Security Analysis for 3GPP-MAC , 2003, FSE.

[17]  Markus Jakobsson,et al.  Stealth attacks on ad-hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[18]  Russ Housley,et al.  Security flaws in 802.11 data link protocols , 2003, CACM.

[19]  Bruce Schneier,et al.  Practical cryptography , 2003 .

[20]  Dan Zhou Security issues in ad hoc networks , 2003 .

[21]  R.W. Brodersen,et al.  Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[22]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[23]  E. Visotsky,et al.  On collaborative detection of TV transmissions in support of dynamic spectrum sharing , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[24]  Danijela Cabric,et al.  Physical layer design issues unique to cognitive radio systems , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[25]  Milind M. Buddhikot,et al.  DIMSUMnet: new directions in wireless networking using coordinated dynamic spectrum , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[26]  C. Cordeiro,et al.  IEEE 802.22: the first worldwide wireless standard based on cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[27]  D. Raychaudhuri,et al.  Spectrum co-existence of IEEE 802.11b and 802.16a networks using the CSCC etiquette protocol , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[28]  Rajarathnam Chandramouli,et al.  Robust encryption for secure image transmission over wireless channels , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[29]  K. Ramchandran,et al.  Detecting primary receivers for cognitive radio applications , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[30]  Abhay Parekh,et al.  Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.

[31]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[32]  Salil S. Kanhere,et al.  NIS07-5: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks , 2006, IEEE Globecom 2006.

[33]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[34]  K. P. Subbalakshmi,et al.  Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[35]  Koduvayur P. Subbalakshmi,et al.  Dynamic Spectrum Access with QoS and Interference Temperature Constraints , 2007, IEEE Trans. Mob. Comput..

[36]  Rajarathnam Chandramouli,et al.  Dynamic Spectrum Access with QoS and Interference Temperature Constraints , 2007, IEEE Transactions on Mobile Computing.

[37]  K. P. Subbalakshmi,et al.  A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices , 2007, Int. J. Netw. Secur..

[38]  Mohamed-Slim Alouini,et al.  On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.

[39]  Zhou Xianwei,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008 .