Security Challenges in Cognitive Radio Networks
暂无分享,去创建一个
[1] C. Cordeiro,et al. IEEE 802.22: the first worldwide wireless standard based on cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[2] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[3] Apurva N. Mody,et al. Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[4] Máire O'Neill,et al. Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[5] Shamik Sengupta,et al. Open research issues in multi-hop cognitive radio networks , 2013, IEEE Communications Magazine.
[6] N. Prasad,et al. Characterizing reliability in cognitive radio networks , 2008, 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies.
[7] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[8] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[9] S. Anand,et al. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[10] E. Ahmed,et al. Spectrum-aware dynamic channel assignment in cognitive radio networks , 2012, 2012 International Conference on Emerging Technologies.
[11] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[12] Shamik Sengupta,et al. Vulnerabilities in cognitive radio networks: A survey , 2013, Comput. Commun..
[13] Li Zhu,et al. An Investigation on Security of Cognitive Radio Networks , 2011, 2011 International Conference on Management and Service Science.
[14] Özgür B. Akan,et al. Cognitive radio sensor networks , 2009, IEEE Network.
[15] Athanasios V. Vasilakos,et al. Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[16] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[17] Xiaohua Li,et al. Anti-jamming performance of cognitive radio networks , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[18] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[19] Chunsheng Xin,et al. FMAC: A fair MAC protocol for coexisting cognitive radio networks , 2013, 2013 Proceedings IEEE INFOCOM.
[20] Loukas Lazos,et al. A Primary User authentication system for mobile cognitive radio networks , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).
[21] Miao Pan,et al. Joint routing and link scheduling for cognitive radio networks under uncertain spectrum supply , 2011, 2011 Proceedings IEEE INFOCOM.
[22] Oluwatobi Olabiyi,et al. Leader election algorithm for distributed ad-hoc cognitive radio networks , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[23] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[24] Santhanakrishnan Anand,et al. Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing , 2009, MOCO.