Spectrum sharing security and attacks in CRNs: a review
暂无分享,去创建一个
[1] José Manuel Moya,et al. Simulation framework for security threats in cognitive radio networks , 2012, IET Commun..
[2] Marwan Krunz,et al. Channel access protocols for multihop opportunistic networks: challenges and recent developments , 2009, IEEE Network.
[3] Atul B. Kathole,et al. Detecting Black and Gray Hole Attacks in Mobile Ad Hoc Network Using an Adaptive Method , 2012 .
[4] A. Anpalagan,et al. Throughput Analysis of Opportunistic Access Strategies in Hybrid Underlay—Overlay Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.
[5] Chen Wei,et al. A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[6] Miguel Soriano,et al. Securing cognitive radio networks , 2010, Int. J. Commun. Syst..
[7] Kang G. Shin,et al. Cognitive radios for dynamic spectrum access: from concept to reality , 2010, IEEE Wireless Communications.
[8] K. P. Subbalakshmi,et al. Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[9] Wanjiun Liao,et al. DH-MAC: A Dynamic Channel Hopping MAC Protocol for Cognitive Radio Networks , 2010, 2010 IEEE International Conference on Communications.
[10] Máire O'Neill,et al. A novel common control channel security framework for cognitive radio networks , 2012, Int. J. Auton. Adapt. Commun. Syst..
[11] Y. Thomas Hou,et al. Cognitive radio communications and networks: principles and practice , 2012 .
[12] Yuan Zhang,et al. Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[13] R. M. A. P. Rajatheva,et al. Overlay/Underlay Spectrum Sharing for Multi-Operator Environment in Cognitive Radio Networks , 2011, 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring).
[14] Kaigui Bian,et al. MAC-Layer Misbehaviors in Multi-Hop Cognitive Radio Networks , 2022 .
[15] Li Zhu,et al. Two Types of Attacks against Cognitive Radio Network MAC Protocols , 2008, 2008 International Conference on Computer Science and Software Engineering.
[16] Yih-Chun Hu,et al. Secure topology discovery through network-wide clock synchronization , 2010, 2010 International Conference on Signal Processing and Communications (SPCOM).
[17] Santhanakrishnan Anand,et al. Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks , 2012, IEEE Transactions on Communications.
[18] Hai Liu,et al. Jump-stay based channel-hopping algorithm with guaranteed rendezvous for cognitive radio networks , 2011, 2011 Proceedings IEEE INFOCOM.
[19] Ajit Singh,et al. A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .
[20] Mohammed Elkoutbi,et al. Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs , 2012, J. Information Security.
[21] F. Richard Yu,et al. Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks , 2010, Wirel. Networks.
[22] Jiang Xie,et al. ProSpect: A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel , 2012, IEEE Transactions on Mobile Computing.
[23] K. J. Ray Liu,et al. Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[24] Xiao-ming Chen,et al. Cognitive Networks and Its Layered Cognitive Architecture , 2010, 2010 Fifth International Conference on Internet Computing for Science and Engineering.
[25] Juebo Wu,et al. Research and Analysis on Cognitive Radio Network Security , 2012 .
[26] N.R. Prasad. Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.
[27] Li Zhu,et al. Unified Layered Security Architecture for Cognitive Radio Networks , 2011, 2011 Asia-Pacific Power and Energy Engineering Conference.
[28] Hongjian Sun,et al. Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011 .
[29] Zhe Chen,et al. Demonstration of real-time spectrum sensing for cognitive radio , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[30] Ananthram Swami,et al. A Survey of Dynamic Spectrum Access: Signal Processing and Networking Perspectives , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[31] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[32] Ananthram Swami,et al. Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework , 2007, IEEE Journal on Selected Areas in Communications.
[33] Ossama Younis,et al. Distance- and Traffic-Aware Channel Assignment in Cognitive Radio Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[34] C. Cordeiro,et al. IEEE 802.22: the first worldwide wireless standard based on cognitive radios , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[35] Yue Wu,et al. Cross-layer Detection for Black Hole Attack in Wireless Network ? , 2012 .
[36] Wu Wei. The research of cognitive communication networks , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[37] Weifang Wang,et al. Spectrum sensing in cognitive radio , 2016 .
[38] Zhu Han,et al. Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[39] Dong In Kim,et al. Game Theoretic Approaches for Multiple Access in Wireless Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.
[40] G. Jakimoski,et al. Denial-of-Service Attacks on Dynamic Spectrum Access Networks , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.
[41] Rahim Tafazolli,et al. A Comparison Between the Centralized and Distributed Approaches for Spectrum Management , 2011, IEEE Communications Surveys & Tutorials.
[42] Shuai Li,et al. Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.
[43] Song Ci,et al. A Cognitive Cross-Layer Architecture for Next-Generation Tactical Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[44] Maria-Gabriella Di Benedetto,et al. A Survey on MAC Strategies for Cognitive Radio Networks , 2012, IEEE Communications Surveys & Tutorials.
[45] Zhu Han,et al. Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[46] Farookh Khadeer Hussain,et al. Digital Signature-Based Secure Communication in Cognitive Radio Networks , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[47] Zenon Chaczko,et al. Security threats in Cognitive Radio applications , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.
[48] S. M. Kamruzzaman. Dynamic TDMA Slot Reservation Protocol for QoS Provisioning in Cognitive Radio Ad Hoc Networks , 2010 .
[49] Xiao Zhou,et al. Encryption and displacement based scheme of defense against Primary User Emulation Attack , 2011 .
[50] Li Zhu,et al. An Efficient Authentication Mechanism for Cognitive Radio Networks , 2011, 2011 Asia-Pacific Power and Energy Engineering Conference.
[51] Krishna Kant Agrawal,et al. Efficient Content Authentication in AdHoc Networks Mitigating DDoS Attacks , 2011 .
[52] Mohammed Elkoutbi,et al. A Dynamic Timestamp Discrepancy against Replay Attacks in MANET , 2011 .
[53] P. Bahl,et al. DSAP: a protocol for coordinated spectrum access , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[54] Xi Chen,et al. Fake BTS Attacks of GSM System on Software Radio Platform , 2012, J. Networks.
[55] Victor C. M. Leung,et al. Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[56] Zhu Han,et al. Attack-proof collaborative spectrum sensing in cognitive radio networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[57] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[58] Feza Buzluca,et al. Protection and fairness oriented cognitive radio MAC protocol for ad hoc networks (PROFCR) , 2010, 2010 European Wireless Conference (EW).
[59] Li Zhu,et al. Research on Authentication Mechanism of Cognitive Radio Networks Based on Certification Authority , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[60] Feng Lin,et al. Cognitive radio network as wireless sensor network (II): Security consideration , 2011, Proceedings of the 2011 IEEE National Aerospace and Electronics Conference (NAECON).
[61] R. H. Jhaveri,et al. A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[62] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[63] K. J. Ray Liu,et al. COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - Dynamic Spectrum Sharing: A Game Theoretical Overview , 2007, IEEE Communications Magazine.
[64] Huseyin Arslan,et al. Spectrum Sensing for Cognitive Radio Applications , 2007 .
[65] An He,et al. A Survey of Artificial Intelligence for Cognitive Radios , 2010, IEEE Transactions on Vehicular Technology.
[66] Han Yu,et al. Anti-PUE Attack Based on Joint Position Verification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.
[67] Ning Liu,et al. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[68] Cheng Li,et al. The security in cognitive radio networks: a survey , 2009, IWCMC.
[69] Li Zhu,et al. An Investigation on Security of Cognitive Radio Networks , 2011, 2011 International Conference on Management and Service Science.
[70] S.A. Khan,et al. Augmented Security in IEEE 802.22 MAC Layer Protocol , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[71] A. Umamaheswari,et al. Survey on performance, reliability and future proposal of Cognitive Radio under wireless computing , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).
[72] Li Li,et al. Replay attacks and detection in tactical MANETs , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[73] Ben Y. Zhao,et al. Multi-channel Jamming Attacks using Cognitive Radios , 2007, 2007 16th International Conference on Computer Communications and Networks.
[74] Ian F. Akyildiz,et al. CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.
[75] Abhay Kumar Rai,et al. Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .
[76] A. Ghasemi,et al. Detecting black hole attack in wireless ad hoc networks based on learning automata , 2011, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT).
[77] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[78] Huayi Wu,et al. An Improved Security Mechanism in Cognitive Radio Networks , 2011, 2011 International Conference on Internet Computing and Information Services.
[79] Chadi Assi,et al. Mitigating Smart Selfish MAC Layer Misbehavior in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[80] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[81] S. Arkoulis,et al. Cognitive Spectrum and Its Security Issues , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.
[82] P. Agrawal,et al. Cognitive Radio Network setup without a Common Control Channel , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[83] S. Anand,et al. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[84] Damla Turgut,et al. An Effective Strategy for Greedy Behavior in Wireless Ad hoc Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[85] Ian F. Akyildiz,et al. A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.
[86] Song Han,et al. Trust based security for cognitive radio networks , 2010, iiWAS.
[87] Lijun Qian,et al. Anomalous spectrum usage attack detection in cognitive radio wireless networks , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[88] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[89] Hyung Seok Kim,et al. Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks , 2011, 2011 Frontiers of Information Technology.
[90] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[91] Alexander M. Wyglinski,et al. A Spectrum Surveying Framework for Dynamic Spectrum Access Networks , 2009, IEEE Transactions on Vehicular Technology.
[92] Luiz A. DaSilva,et al. Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.
[93] Haitao Zheng,et al. Distributed Rule-Regulated Spectrum Sharing , 2008, IEEE Journal on Selected Areas in Communications.
[94] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .
[95] Song Han,et al. Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[96] Hui Wang,et al. A Survey on MAC Protocols for Opportunistic Spectrum Access in Cognitive Radio Networks , 2008, 2008 International Conference on Computer Science and Software Engineering.
[97] Jiannong Cao,et al. Joint Optimization of Spectrum Handoff Scheduling and Routing in Multi-hop Multi-radio Cognitive Networks , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[98] J. Sebastian Terence. Secure route discovery against wormhole attacks in sensor networks using mobile agents , 2011, 3rd International Conference on Trendz in Information Sciences & Computing (TISC2011).
[99] Xiaohua Li,et al. Secure transmission power of cognitive radios for dynamic spectrum access applications , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[100] Do-Hoon Kim,et al. Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.
[101] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[102] Chittabrata Ghosh,et al. Secure Communication in Cognitive Radio Networks , 2022 .
[103] L. Ma,et al. Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[104] Wajdi Alhakami,et al. A secure MAC protocol for Cognitive Radio Networks (SMCRN) , 2013, 2013 Science and Information Conference.