Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey
暂无分享,去创建一个
[1] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[3] Robert Benjamin. Security considerations in communications systems and networks , 1990 .
[4] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[5] C. Aliprantis,et al. Games and Decision Making , 1999 .
[6] R. Hunt,et al. TCP/IP security threats and attack methods , 1999, Comput. Commun..
[7] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[8] Eric van Damme,et al. Non-Cooperative Games , 2000 .
[9] Vipul Gupta,et al. Freeze-TCP: a true end-to-end TCP enhancement mechanism for mobile environments , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[10] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels III: Privacy amplification , 2003, IEEE Trans. Inf. Theory.
[11] I. Motivation,et al. Secret-Key Agreement Over Unauthenticated Public Channels—Part III: Privacy Amplification , 2003 .
[12] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[13] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels II: the simulatability condition , 2003, IEEE Trans. Inf. Theory.
[14] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.
[15] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[16] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[17] Songwu Lu,et al. Securing a Wireless World , 2006, Proceedings of the IEEE.
[18] Wade Trappe,et al. TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[19] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[20] Yonghong Zeng,et al. Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Transactions on Wireless Communications.
[21] Geoffrey Ye Li,et al. Cooperative Spectrum Sensing in Cognitive Radio, Part I: Two User Networks , 2007, IEEE Transactions on Wireless Communications.
[22] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[23] Geoffrey Ye Li,et al. Cooperative Spectrum Sensing in Cognitive Radio, Part II: Multiuser Networks , 2007, IEEE Transactions on Wireless Communications.
[24] Carlo S. Regazzoni,et al. Spectrum sensing: A distributed approach for cognitive terminals , 2007, IEEE Journal on Selected Areas in Communications.
[25] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[26] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[27] Jack L. Burbank,et al. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[28] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[29] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[30] A. Sahai,et al. Crime and Punishment for Cognitive Radios , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[31] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[32] H. Vincent Poor,et al. A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.
[33] Gongjun Yan,et al. Game Theory for Resource Allocation in Wireless Networks , 2010 .
[34] Kang G. Shin,et al. Cognitive radios for dynamic spectrum access: from concept to reality , 2010, IEEE Wireless Communications.
[35] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[36] Majid Khabbazian,et al. Malicious User Detection in a Cognitive Radio Cooperative Sensing System , 2010, IEEE Transactions on Wireless Communications.
[37] Zhu Han,et al. Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.
[38] Danijela Cabric,et al. Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.
[39] Jack Burbank. Security in Cognitive Radio Networks , 2010 .
[40] Hisato Iwai,et al. Secret Key Agreement Based on Radio Propagation Characteristics in Two-Way Relaying Systems , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[41] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[42] T. Charles Clancy,et al. Physical Layer Authentication Watermarks through Synthetic Channel Emulation , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[43] Zehua Gao,et al. Secure Cooperative Spectrum Trading in Cognitive Radio Networks: A Reversed Stackelberg Approach , 2010, 2010 International Conference on Multimedia Communications.
[44] K. J. Ray Liu,et al. Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.
[45] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[46] Juan Hernández-Serrano,et al. Modeling the Lion Attack in Cognitive Radio Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[47] A. Robert Calderbank,et al. The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach , 2011, IEEE Transactions on Information Forensics and Security.
[48] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
[49] Laurence B. Milstein,et al. Spoofing or Jamming: Performance Analysis of a Tactical Cognitive Radio Adversary , 2011, IEEE Journal on Selected Areas in Communications.
[50] Luiz A. DaSilva,et al. Rendezvous for Cognitive Radios , 2011, IEEE Transactions on Mobile Computing.
[51] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[52] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[53] Hisato Iwai,et al. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.
[54] J. Wallace,et al. Physical layer key generation methods for arbitrary fading channels , 2011, 2011 IEEE International Symposium on Antennas and Propagation (APSURSI).
[55] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[56] Kang G. Shin,et al. Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.
[57] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[58] Andrew Thangaraj,et al. Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes , 2010, IEEE Transactions on Information Forensics and Security.
[59] Alexandre J. Pierrot,et al. Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.
[60] Shamik Sengupta,et al. Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2011, IEEE Journal on Selected Areas in Communications.
[61] Shlomo Shamai,et al. On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels , 2010, IEEE Transactions on Information Forensics and Security.
[62] Athina P. Petropulu,et al. Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading , 2011, IEEE Transactions on Information Forensics and Security.
[63] Yu-Dong Yao,et al. Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.
[64] Suhas N. Diggavi,et al. Secret-Key Agreement With Channel State Information at the Transmitter , 2010, IEEE Transactions on Information Forensics and Security.
[65] Ahsan Aziz,et al. Physical layer authentication using controlled inter symbol interference , 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks.
[66] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[67] Daesik Hong,et al. Goodness-of-Fit-Based Malicious User Detection in Cooperative Spectrum Sensing , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).
[68] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[69] Xiuzhen Cheng,et al. Dynamic spectrum access: from cognitive radio to network radio , 2012, IEEE Wireless Communications.
[70] Il-Min Kim,et al. Secure communications with untrusted secondary users in cognitive radio networks , 2014, 2012 IEEE Global Communications Conference (GLOBECOM).
[71] Mansoor Alam,et al. A robust malicious user detection scheme in cooperative spectrum sensing , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[72] Zhiqiang Li,et al. Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks , 2012, IET Commun..
[73] José Manuel Moya,et al. Simulation framework for security threats in cognitive radio networks , 2012, IET Commun..
[74] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[75] Yiwei Thomas Hou,et al. On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication , 2012, IEEE Wireless Communications Letters.
[76] Qiang Chen,et al. An Enhanced D-S Theory Cooperative Spectrum Sensing Algorithm against SSDF Attack , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).
[77] K. J. Ray Liu,et al. Indirect Reciprocity Security Game for Large-Scale Wireless Networks , 2012, IEEE Transactions on Information Forensics and Security.
[78] Shamik Sengupta,et al. Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach , 2012, IET Commun..
[79] Shuai Li,et al. Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.
[80] Zhu Han,et al. Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[81] Lara Dolecek,et al. Detecting and Counteracting Statistical Attacks in Cooperative Spectrum Sensing , 2012, IEEE Transactions on Signal Processing.
[82] Jiang Xie,et al. Finding out the liars: Fighting against false channel information exchange attacks in cognitive radio ad hoc networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[83] Tongtong Li,et al. Toward secure cognitive communications in wireless networks , 2012, IEEE Wireless Communications.
[84] K. J. Ray Liu,et al. Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[85] Santhanakrishnan Anand,et al. Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks , 2012, IEEE Transactions on Communications.
[86] Kang G. Shin,et al. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.
[87] Jim Esch,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proc. IEEE.
[88] David Starobinski,et al. Rate adaptation in unlicensed bands under smart jamming attacks , 2012, 2012 7th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM).
[89] Joseph Mitola,et al. Most Active Band (MAB) Attack and Countermeasures in a Cognitive Radio Network , 2012, IEEE Transactions on Wireless Communications.
[90] Prasant Mohapatra,et al. Detecting spectrum misuse in wireless networks , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).
[91] Shuai Li,et al. An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[92] Prasant Mohapatra,et al. Trusted collaborative spectrum sensing for mobile cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.
[93] Suhas N. Diggavi,et al. Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.
[94] Lei Yang,et al. Enforcing dynamic spectrum access with spectrum permits , 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks.
[95] Wen-Long Chin,et al. Channel-Based Detection of Primary User Emulation Attacks in Cognitive Radios , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).
[96] Peng Ning,et al. A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check , 2013, IEEE Transactions on Wireless Communications.
[97] Nei Kato,et al. Intrusion detection system (IDS) for combating attacks against cognitive radio networks , 2013, IEEE Network.
[98] Chunsheng Xin,et al. A game-theoretical anti-jamming scheme for cognitive radio networks , 2013, IEEE Network.
[99] Javier Blesa,et al. PUE Attack Detection in CWSN Using Collaboration and Learning Behavior , 2013, Int. J. Distributed Sens. Networks.
[100] Qun Li,et al. Defending Against Cooperative Attacks in Cooperative Spectrum Sensing , 2013, IEEE Transactions on Wireless Communications.
[101] Gongjun Yan,et al. Wireless Network Security: An Overview , 2013 .
[102] Xiaojiang Du,et al. Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention , 2013, IEEE Network.
[103] Do-Hoon Kim,et al. Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.
[104] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[105] Loukas Lazos,et al. Vulnerabilities of cognitive radio MAC protocols and countermeasures , 2013, IEEE Network.
[106] Hong Wen,et al. A framework of the PHY-layer approach to defense against security threats in cognitive radio networks , 2013, IEEE Network.
[107] Bin Liu,et al. Detection of collaborative SSDF attacks using abnormality detection algorithm in cognitive radio networks , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).
[108] Peng Ning,et al. HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing , 2013, IEEE Journal on Selected Areas in Communications.
[109] Rahim Tafazolli,et al. On the Trade-Off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio , 2013, IEEE Communications Letters.
[110] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[111] Weidong Xiang,et al. Detecting multi-channel wireless microphone user emulation attacks in white space with noise , 2013 .
[112] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[113] Qingqi Pei,et al. A Trust Value-Based Spectrum Allocation Algorithm in CWSNs , 2013, Int. J. Distributed Sens. Networks.
[114] Andrey Garnaev,et al. Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments , 2013, 8th International Conference on Cognitive Radio Oriented Wireless Networks.
[115] Roberto Di Pietro,et al. Jamming mitigation in cognitive radio networks , 2013, IEEE Network.
[116] D. Rawat,et al. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications , 2013 .
[117] Mainak Chatterjee,et al. Utilizing misleading information for cooperative spectrum sensing in cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[118] Zhu Han,et al. Efficient anti-jamming truthful spectrum auction among secondary users in cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[119] Kang G. Shin,et al. Robust Tracking of Small-Scale Mobile Primary User in Cognitive Radio Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[120] Weidong Xiang,et al. Detecting multi-channel wireless microphone user emulation attacks in white space with noise , 2013, 8th International Conference on Cognitive Radio Oriented Wireless Networks.
[121] Wenliang Du,et al. A physical layer authentication scheme for countering primary user emulation attack , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[122] Young-Hyun Oh,et al. Sequence sensing Jamming attacks against modular-based channel hopping rendezvous algorithms for cognitive ratio networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[123] Parth H. Pathak,et al. On insider misbehavior detection in cognitive radio networks , 2013, IEEE Network.
[124] Qihui Wu,et al. Stealthy-Attacker Detection With a Multidimensional Feature Vector for Collaborative Spectrum Sensing , 2013, IEEE Transactions on Vehicular Technology.
[125] Michael A. Temple,et al. Classifier selection for physical layer security augmentation in Cognitive Radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[126] Prasant Mohapatra,et al. Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space , 2013, IEEE Transactions on Mobile Computing.
[127] Zhu Han,et al. Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks , 2013, IEEE Transactions on Mobile Computing.
[128] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[129] Wang Li,et al. Security-oriented transmission based on cooperative relays in cognitive radio , 2013, China Communications.
[130] Tharmalingam Ratnarajah,et al. Enhancing security in the cognitive relay assisted co-existing radio systems with interferences , 2013, 2013 IEEE International Conference on Communications (ICC).
[131] Tamer Başar,et al. A game-theoretic view on the physical layer security of cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[132] Xuemin Shen,et al. Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.
[133] Eylem Ekici,et al. Secrecy in cognitive radio networks: Turning foes to allies , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).
[134] Álvaro Araujo,et al. PUE attack detection in CWSNs using anomaly detection techniques , 2013, EURASIP J. Wirel. Commun. Netw..
[135] Reihaneh Safavi-Naini,et al. ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[136] Rajesh K. Sharma,et al. Physical Layer Security and Its Applications: A Survey , 2014 .
[137] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[138] Sheng Zhong,et al. Towards Cheat-Proof Cooperative Relayfor Cognitive Radio Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[139] Sheng Zhong,et al. Towards Cheat-Proof Cooperative Relayfor Cognitive Radio Networks , 2014, IEEE Trans. Parallel Distributed Syst..