Physical Layer Security of Cognitive IoT Networks

[1]  Qihui Wu,et al.  Cognitive Internet of Things: A New Paradigm Beyond Connection , 2014, IEEE Internet of Things Journal.

[2]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[3]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[4]  K. P. Subbalakshmi,et al.  Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[5]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[6]  Zhigang Chen,et al.  Energy-Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network , 2016, IEEE Transactions on Vehicular Technology.

[7]  Gerd Ascheid,et al.  How Effective is the Artificial Noise? Real-Time Analysis of a PHY Security Scenario , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[8]  Chen Hongsong,et al.  Security and trust research in M2M system , 2011, Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety.

[9]  Qun Li,et al.  Defending Against Cooperative Attacks in Cooperative Spectrum Sensing , 2013, IEEE Transactions on Wireless Communications.

[10]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[11]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[12]  Chung-Hsin Liu,et al.  The Analysis for DoS and DDoS Attacks of WLAN , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[13]  Olga León Abarca,et al.  Securing cognitive radio networks , 2010 .

[14]  Mubashir Husain Rehmani,et al.  Cognitive-Radio-Based Internet of Things: Applications, Architectures, Spectrum Related Functionalities, and Future Research Directions , 2017, IEEE Wireless Communications.

[15]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[16]  S. Kumar,et al.  Survivability Evaluation of Wireless Sensor Network under DDoS Attack , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[17]  Loukas Lazos,et al.  Packet-Hiding Methods for Preventing Selective Jamming Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.

[18]  Ryuya Uda,et al.  Privacy Protection on Transfer System of Automated Teller Machine from Brute Force Attack , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[19]  Michele Nogueira Lima,et al.  Managing sensing and cooperation to analyze PUE attacks in Cognitive Radio Ad Hoc Networks , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[20]  Simon Haykin,et al.  Smart Home: Cognitive Interactive People-Centric Internet of Things , 2017, IEEE Communications Magazine.

[21]  Kang G. Shin,et al.  Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[22]  Sherali Zeadally,et al.  Internet of Things (IoT): Research, Simulators, and Testbeds , 2018, IEEE Internet of Things Journal.

[23]  Souhwan Jung,et al.  Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).

[24]  Timothy X. Brown,et al.  Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..

[25]  Roberto Di Pietro,et al.  Jamming mitigation in cognitive radio networks , 2013, IEEE Network.

[26]  Xu Huang,et al.  Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange , 2010, 2010 Fourth International Conference on Network and System Security.

[27]  Gerd Ascheid,et al.  An encryption aware physical layer security system , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).

[28]  Walaa Hamouda,et al.  Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and Applications , 2017, IEEE Communications Surveys & Tutorials.

[29]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[30]  Monica Nicoli,et al.  Wireless networks for smart surveillance: Technologies, protocol design and experiments , 2012, 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[31]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[32]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[33]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[34]  Jung-Min Park,et al.  Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.

[35]  Miguel Soriano,et al.  Securing cognitive radio networks , 2010 .

[36]  Günes Karabulut-Kurt,et al.  A High Data Rate Wireless Communication System With Improved Secrecy: Full Duplex Beamforming , 2014, IEEE Communications Letters.

[37]  Christof Paar,et al.  SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers , 2005, CHES.

[38]  Mohsen Guizani,et al.  Securing Cognitive Radio Networks against Primary User Emulation Attacks , 2016, IEEE Network.

[39]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[40]  Jiang-ning Xu,et al.  Analysis on the Feasibility of Denial of Service of GPS Receivers Based on Hidden Messages , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[41]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[42]  Klaus Moessner,et al.  Enabling smart cities through a cognitive management framework for the internet of things , 2013, IEEE Communications Magazine.

[43]  Günes Karabulut-Kurt,et al.  Physical layer security in cognitive radio networks: A beamforming approach , 2013, 2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom).

[44]  Igor V. Kotenko,et al.  Security Analysis of Information Systems Taking into Account Social Engineering Attacks , 2011, 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing.

[45]  Gerd Ascheid,et al.  A Joint Optimization Scheme for Artificial Noise and Transmit Filter for Half and Full Duplex Wireless Cyber Physical Systems , 2018, IEEE Transactions on Sustainable Computing.

[46]  G. Appa Rao,et al.  Intrusion detection: An energy efficient approach in heterogeneous WSN , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[47]  Kouichi Sakurai,et al.  A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[48]  Gagandeep Kaur,et al.  Anomaly Detection in network traffic and role of wavelets , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[49]  Rathanakar Acharya,et al.  Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.

[50]  Ben Y. Zhao,et al.  Multi-channel Jamming Attacks using Cognitive Radios , 2007, 2007 16th International Conference on Computer Communications and Networks.

[51]  Vangelis Gazis,et al.  A Survey of Standards for Machine-to-Machine and the Internet of Things , 2017, IEEE Communications Surveys & Tutorials.

[52]  Martin Reisslein,et al.  Full-Duplex Communication in Cognitive Radio Networks: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[53]  Christophe Diot,et al.  Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.

[54]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[55]  Hossein Pedram,et al.  A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents , 2009, 2009 International Conference on Computational Intelligence and Security.

[56]  Mubashir Husain Rehmani,et al.  When Cognitive Radio meets the Internet of Things? , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[57]  M. Bala Krishna,et al.  Symmetric key management and distribution techniques in wireless ad hoc networks , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.