메뉴 건너뛰기




Volumn 23, Issue 5, 2010, Pages 633-652

Securing cognitive radio networks

Author keywords

Cognitive radio; Cognitive radio network; Security

Indexed keywords

COGNITIVE RADIO; COGNITIVE RADIO NETWORK; ELECTROMAGNETIC SPECTRA; MODE OF OPERATIONS; RADIO APPLICATIONS; SECURITY CHALLENGES; SECURITY ISSUES; SECURITY SOLUTIONS;

EID: 77951855384     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac     Document Type: Article
Times cited : (121)

References (41)
  • 2
    • 77951850343 scopus 로고    scopus 로고
    • Federal Communications Commission. Facilitating the provision of spectrum-based services to rural areas and promoting opportunities for rural telephone companies to provide spectrum-based services. September
    • Federal Communications Commission. Facilitating the provision of spectrum-based services to rural areas and promoting opportunities for rural telephone companies to provide spectrum-based services. FCC 04-166. WT Docket No. 02-381, September 2004.
    • (2004) FCC 04-166. WT Docket No. 02-381
  • 3
    • 77951813326 scopus 로고    scopus 로고
    • National Telecommunications and Information Administration (NTIA). Comments to FCC 03-322 ET Docket No. 03-108, February Available from
    • National Telecommunications and Information Administration (NTIA). Comments to FCC 03-322 ET Docket No. 03-108, February 2005. Available from: http://www.ntia.doc.gov/ntiahome/fccfilings/2005/cogradio/ETDocket03- 10802152005.htm.
    • (2005)
  • 4
  • 6
    • 33745648091 scopus 로고    scopus 로고
    • Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey
    • Akyildiz IF, Lee WY, Vuran MC, Mohanty S. Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks 2006; 50(13):2127-2159. DOI: http://dx.doi.org/10.1016/ j.comnet.2006.05.001.
    • (2006) Computer Networks , vol.50 , Issue.13 , pp. 2127-2159
    • Akyildiz, I.F.1    Lee, W.Y.2    Vuran, M.C.3    Mohanty, S.4
  • 10
    • 79956087176 scopus 로고    scopus 로고
    • IEEE 802.22: An introduction to the first wireless standard based on cognitive radios
    • Cordeiro C, Challapali K, Birru D, Shankar NS. IEEE 802.22: an introduction to the first wireless standard based on cognitive radios. Journal of Communications 2006; 1(1):38-47.
    • (2006) Journal of Communications , vol.1 , Issue.1 , pp. 38-47
    • Cordeiro, C.1    Challapali, K.2    Birru, D.3    Shankar, N.S.4
  • 13
    • 77951849778 scopus 로고    scopus 로고
    • CORVUS: A cognitive radio approach for usage of virtual unlicensed spectrum
    • Available from
    • Mishra SM. CORVUS: A cognitive radio approach for usage of virtual unlicensed spectrum. Berleley MCMA White Paper, 2004. Available from: http://bwrc.eecs.berkeley.edu/Research/MCMA/CRWhitepaperfinal1.pdf.
    • (2004) Berleley MCMA White Paper
    • Mishra, S.M.1
  • 15
    • 85008048349 scopus 로고    scopus 로고
    • IEEE 802.22: The first cognitive radio wireless regional area network standard
    • IEEE DOI: 10.1109/MCOM.2009.4752688
    • Stevenson C, Chouinard G, Lei Z, Hu W, Shellhammer S, Caldwell W. IEEE 802.22: the first cognitive radio wireless regional area network standard. Communications Magazine, IEEE 2009; 47(1):130-138. DOI: 10.1109/MCOM.2009. 4752688.
    • (2009) Communications Magazine , vol.47 , Issue.1 , pp. 130-138
    • Stevenson, C.1    Chouinard, G.2    Lei, Z.3    Hu, W.4    Shellhammer, S.5    Caldwell, W.6
  • 17
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI: 10.1016/S1570-8705(03)00008-8. Sensor Network Protocols and Applications
    • Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003; 1(2-3):293-315. DOI: 10.1016/S1570-8705(03)00008-8. Sensor Network Protocols and Applications.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 18
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • DOI: 10.1109/JSAC.2008.080104
    • Chen R, Park JM, Reed J. Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications 2008; 26(1):25-37. DOI: 10.1109/JSAC.2008.080104. Copyright © 2010 John Wiley & Sons, Ltd. Int. J. Commun. Syst. 2010; 23:633-652
    • (2008) IEEE Journal on Selected Areas in Communications , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.M.2    Reed, J.3
  • 27
    • 77951857813 scopus 로고    scopus 로고
    • Recommended text for security in 802.22. 802.22 WG on WRANs-doc.: IEEE 802.22-08/0174r18. Available at:, May
    • Mody A, Reddy R, Kiernan T. Recommended text for security in 802.22. 802.22 WG on WRANs-doc.: IEEE 802.22-08/0174r18. Available at: https://mentor.ieee.org/802.22/dcn/08/22-08-0174-18-0000-recommendedtext-for- section-7-on-security-in-802-22.doc, May 2009.
    • (2009)
    • Mody, A.1    Reddy, R.2    Kiernan, T.3
  • 30
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • IEEE DOI: 10.1109/MWC.2004.1269717
    • Mishra A, Nadkarni K, Patcha A. Intrusion detection in wireless ad hoc networks. Wireless Communications, IEEE 2004; 11(1):48-60. DOI: 10.1109/MWC.2004.1269717.
    • (2004) Wireless Communications , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 31
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • Bhuse V, Gupta A. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 2006; 15(1):33-51.
    • (2006) Journal of High Speed Networks , vol.15 , Issue.1 , pp. 33-51
    • Bhuse, V.1    Gupta, A.2
  • 32
    • 77951806475 scopus 로고    scopus 로고
    • Federal Communications Commission. Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies. December
    • Federal Communications Commission. Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies. FCC 03-322. ET Docket No. 03-108, December 2003.
    • (2003) FCC 03-322. ET Docket No. 03-108
  • 33
    • 34249822230 scopus 로고    scopus 로고
    • Wireless security through RF fingerprinting
    • DOI 10.1109/CJECE.2007.364330
    • Ureten O, Serinken N. Wireless security through rf fingerprinting. Electrical and Computer Engineering, Canadian Journal of Winter 2007; 32(1):27-33. DOI: 10.1109/CJECE.2007.364330. (Pubitemid 46852763)
    • (2007) Canadian Journal of Electrical and Computer Engineering , vol.32 , Issue.1 , pp. 27-33
    • Ureten, O.1    Serinken, N.2
  • 35
    • 57849143358 scopus 로고    scopus 로고
    • Passive steady state rf fingerprinting: A cognitive technique for scalable deployment of co-channel femto cell underlays
    • DySPAN 2008, October 2008; DOI: 10.1109/DYSPAN.2008.46
    • Kennedy I, Scanlon P, Buddhikot M. Passive steady state rf fingerprinting: a cognitive technique for scalable deployment of co-channel femto cell underlays. Third IEEE Symposium on the New Frontiers in Dynamic Spectrum Access Networks, 2008, DySPAN 2008, October 2008; 1-12. DOI: 10.1109/DYSPAN.2008.46.
    • (2008) Third IEEE Symposium on the New Frontiers in Dynamic Spectrum Access Networks , pp. 1-12
    • Kennedy, I.1    Scanlon, P.2    Buddhikot, M.3
  • 36
    • 0033131438 scopus 로고    scopus 로고
    • Integrated approach for fault tolerance and digital signature in rsa
    • DOI: 10.1049/ip-cdt:19990217
    • Zhang C. Integrated approach for fault tolerance and digital signature in rsa. Computers and Digital Techniques, IEE Proceedings 1999; 146(3):151-159. DOI: 10.1049/ip-cdt:19990217.
    • (1999) Computers and Digital Techniques, IEE Proceedings , vol.146 , Issue.3 , pp. 151-159
    • Zhang, C.1
  • 39
    • 0003259063 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • National Security Agency, June
    • Wallner D, Harder E, Agee R. Key management for multicast: issues and architectures. National Security Agency, Network Working Group-RFC 2627, June 1999.
    • (1999) Network Working Group-RFC 2627
    • Wallner, D.1    Harder, E.2    Agee, R.3
  • 41
    • 27644497750 scopus 로고    scopus 로고
    • Policy-based management of networked computing systems
    • DOI 10.1109/MCOM.2005.1522127
    • Agrawal D, Lee KW, Lobo J. Policy-based management of networked computing systems. Communications Magazine, IEEE 2005; 43(10):69-75. (Pubitemid 41556211)
    • (2005) IEEE Communications Magazine , vol.43 , Issue.10 , pp. 69-75
    • Agrawal, D.1    Lee, K.-W.2    Lobo, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.