메뉴 건너뛰기




Volumn , Issue , 2009, Pages 309-313

The security in cognitive radio networks: A survey

Author keywords

Cognitive radio; Intrusion detection; Protection; Protocol layer; Security

Indexed keywords

INTERNET PROTOCOLS; INTRUSION DETECTION; NETWORK LAYERS; NETWORK SECURITY; QUALITY OF SERVICE; RADIO; RADIO SYSTEMS;

EID: 70450245333     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1582379.1582447     Document Type: Conference Paper
Times cited : (35)

References (17)
  • 1
    • 85008020040 scopus 로고    scopus 로고
    • The End of Spectrum Scarcity
    • Mar
    • G. Staple and K. Werbach, "The End of Spectrum Scarcity," IEEE Spectrum, vol. 41, no. 3, Mar. 2004, pp.48-52.
    • (2004) IEEE Spectrum , vol.41 , Issue.3 , pp. 48-52
    • Staple, G.1    Werbach, K.2
  • 2
    • 13844296408 scopus 로고    scopus 로고
    • Cognitive Radio: Brain-Empowered Wireless Communications
    • FEBRUARY
    • S. Haykin, "Cognitive Radio: Brain-Empowered Wireless Communications," IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 2, FEBRUARY 2005.
    • (2005) IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , vol.23 , Issue.2
    • Haykin, S.1
  • 3
    • 33745648091 scopus 로고    scopus 로고
    • Next generation/ dynamic spectrum access/cognitivw radio wireless network: A survey
    • Sept
    • I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohantly, "Next generation/ dynamic spectrum access/cognitivw radio wireless network: a survey," Elsevier Computer Networks, vol. 50, pp. 2127-2159, Sept.2006.
    • (2006) Elsevier Computer Networks , vol.50 , pp. 2127-2159
    • Akyildiz, I.F.1    Lee, W.-Y.2    Vuran, M.C.3    Mohantly, S.4
  • 4
    • 85184639867 scopus 로고    scopus 로고
    • J. L. Burbank, Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security, CrownCom 2008. 3rd international Conference on , no., pp.1-7, 15-17 May.
    • J. L. Burbank, "Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security," CrownCom 2008. 3rd international Conference on , vol., no., pp.1-7, 15-17 May.
  • 5
    • 42649092608 scopus 로고    scopus 로고
    • A Survey on Spectrum Management in Cognitive Radio Networks
    • April
    • I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, "A Survey on Spectrum Management in Cognitive Radio Networks," IEEE Communications Magazine, vol. 46, pp. 40-80, April 2008.
    • (2008) IEEE Communications Magazine , vol.46 , pp. 40-80
    • Akyildiz, I.F.1    Lee, W.2    Vuran, M.C.3    Mohanty, S.4
  • 7
    • 85184639698 scopus 로고    scopus 로고
    • Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks
    • IEEE GLOBECOM
    • A. Naveed and S. S. Kanhere, "Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks," 2006, IEEE GLOBECOM 2006.
    • (2006)
    • Naveed, A.1    Kanhere, S.S.2
  • 9
    • 42649135628 scopus 로고    scopus 로고
    • Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks
    • April
    • R. Chen, J. Park, Y. Hou, and J. H. Reed, "Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks," IEEE Communications Magazine, vol. 46, pp. 50-55, April 2008.
    • (2008) IEEE Communications Magazine , vol.46 , pp. 50-55
    • Chen, R.1    Park, J.2    Hou, Y.3    Reed, J.H.4
  • 16
    • 51749119910 scopus 로고    scopus 로고
    • Impact of Cognitive Radio on Future Management of Spectrum
    • Nekovee, M. B. Res, Suffolk, "Impact of Cognitive Radio on Future Management of Spectrum", CrownCom, 2008.
    • (2008) CrownCom
    • Nekovee, M.B.1    Res, S.2
  • 17
    • 33749041485 scopus 로고    scopus 로고
    • Applying Intrusion Detection Systems to Wireless Sensor Networks
    • R. Roman, J. Zhou and J. Lopez, "Applying Intrusion Detection Systems to Wireless Sensor Networks", CCNC 2006. 3rd IEEE.
    • CCNC 2006. 3rd IEEE
    • Roman, R.1    Zhou, J.2    Lopez, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.