Physical Layer Security of Cognitive IoT Networks
暂无分享,去创建一个
[1] Qihui Wu,et al. Cognitive Internet of Things: A New Paradigm Beyond Connection , 2014, IEEE Internet of Things Journal.
[2] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[3] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[4] K. P. Subbalakshmi,et al. Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[5] Liuqing Yang,et al. Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.
[6] Zhigang Chen,et al. Energy-Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network , 2016, IEEE Transactions on Vehicular Technology.
[7] Gerd Ascheid,et al. How Effective is the Artificial Noise? Real-Time Analysis of a PHY Security Scenario , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).
[8] Chen Hongsong,et al. Security and trust research in M2M system , 2011, Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety.
[9] Qun Li,et al. Defending Against Cooperative Attacks in Cooperative Spectrum Sensing , 2013, IEEE Transactions on Wireless Communications.
[10] Brian M. Sadler,et al. A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.
[11] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[12] Chung-Hsin Liu,et al. The Analysis for DoS and DDoS Attacks of WLAN , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[13] Olga León Abarca,et al. Securing cognitive radio networks , 2010 .
[14] Mubashir Husain Rehmani,et al. Cognitive-Radio-Based Internet of Things: Applications, Architectures, Spectrum Related Functionalities, and Future Research Directions , 2017, IEEE Wireless Communications.
[15] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[16] S. Kumar,et al. Survivability Evaluation of Wireless Sensor Network under DDoS Attack , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[17] Loukas Lazos,et al. Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[18] Ryuya Uda,et al. Privacy Protection on Transfer System of Automated Teller Machine from Brute Force Attack , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[19] Michele Nogueira Lima,et al. Managing sensing and cooperation to analyze PUE attacks in Cognitive Radio Ad Hoc Networks , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[20] Simon Haykin,et al. Smart Home: Cognitive Interactive People-Centric Internet of Things , 2017, IEEE Communications Magazine.
[21] Kang G. Shin,et al. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.
[22] Sherali Zeadally,et al. Internet of Things (IoT): Research, Simulators, and Testbeds , 2018, IEEE Internet of Things Journal.
[23] Souhwan Jung,et al. Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).
[24] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..
[25] Roberto Di Pietro,et al. Jamming mitigation in cognitive radio networks , 2013, IEEE Network.
[26] Xu Huang,et al. Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange , 2010, 2010 Fourth International Conference on Network and System Security.
[27] Gerd Ascheid,et al. An encryption aware physical layer security system , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
[28] Walaa Hamouda,et al. Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and Applications , 2017, IEEE Communications Surveys & Tutorials.
[29] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[30] Monica Nicoli,et al. Wireless networks for smart surveillance: Technologies, protocol design and experiments , 2012, 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[31] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[32] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[33] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[34] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[35] Miguel Soriano,et al. Securing cognitive radio networks , 2010 .
[36] Günes Karabulut-Kurt,et al. A High Data Rate Wireless Communication System With Improved Secrecy: Full Duplex Beamforming , 2014, IEEE Communications Letters.
[37] Christof Paar,et al. SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers , 2005, CHES.
[38] Mohsen Guizani,et al. Securing Cognitive Radio Networks against Primary User Emulation Attacks , 2016, IEEE Network.
[39] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[40] Jiang-ning Xu,et al. Analysis on the Feasibility of Denial of Service of GPS Receivers Based on Hidden Messages , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[41] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[42] Klaus Moessner,et al. Enabling smart cities through a cognitive management framework for the internet of things , 2013, IEEE Communications Magazine.
[43] Günes Karabulut-Kurt,et al. Physical layer security in cognitive radio networks: A beamforming approach , 2013, 2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom).
[44] Igor V. Kotenko,et al. Security Analysis of Information Systems Taking into Account Social Engineering Attacks , 2011, 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing.
[45] Gerd Ascheid,et al. A Joint Optimization Scheme for Artificial Noise and Transmit Filter for Half and Full Duplex Wireless Cyber Physical Systems , 2018, IEEE Transactions on Sustainable Computing.
[46] G. Appa Rao,et al. Intrusion detection: An energy efficient approach in heterogeneous WSN , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.
[47] Kouichi Sakurai,et al. A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[48] Gagandeep Kaur,et al. Anomaly Detection in network traffic and role of wavelets , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[49] Rathanakar Acharya,et al. Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.
[50] Ben Y. Zhao,et al. Multi-channel Jamming Attacks using Cognitive Radios , 2007, 2007 16th International Conference on Computer Communications and Networks.
[51] Vangelis Gazis,et al. A Survey of Standards for Machine-to-Machine and the Internet of Things , 2017, IEEE Communications Surveys & Tutorials.
[52] Martin Reisslein,et al. Full-Duplex Communication in Cognitive Radio Networks: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[53] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[54] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[55] Hossein Pedram,et al. A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents , 2009, 2009 International Conference on Computational Intelligence and Security.
[56] Mubashir Husain Rehmani,et al. When Cognitive Radio meets the Internet of Things? , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[57] M. Bala Krishna,et al. Symmetric key management and distribution techniques in wireless ad hoc networks , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.