메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach

Author keywords

[No Author keywords available]

Indexed keywords

COGNITIVE RADIO; JAMMING; NETWORK SECURITY; RADIO; RADIO SYSTEMS;

EID: 79551630315     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2010.5683729     Document Type: Conference Paper
Times cited : (46)

References (13)
  • 2
    • 85164892042 scopus 로고    scopus 로고
    • Game theory for cognitive radio networks: An overview
    • to appear
    • B. Wang, Y. Wu, and K. J. R. Liu, "Game theory for cognitive radio networks: an overview," Computer Networks, to appear.
    • Computer Networks
    • Wang, B.1    Wu, Y.2    Liu, K.J.R.3
  • 3
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan.
    • R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25-37, Jan. 2008.
    • (2008) IEEE Journal on Selected Areas in Communications , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.-M.2    Reed, J.H.3
  • 5
    • 58049113451 scopus 로고    scopus 로고
    • Hammer model threat assessment of cognitive radio denial of service attacks
    • Oct.
    • A. Sethi and T. X. Brown, "Hammer model threat assessment of cognitive radio denial of service attacks," IEEE DySPAN, Oct. 2008.
    • (2008) IEEE DySPAN
    • Sethi, A.1    Brown, T.X.2
  • 6
    • 77951594186 scopus 로고    scopus 로고
    • CatchIt: Detect malicious nodes in collaborative spectrum sensing
    • Hawaii, Dec.
    • W. Wang, H. Li, Y. Sun, and Z. Han, "CatchIt: detect malicious nodes in collaborative spectrum sensing," IEEE Globecom, Hawaii, Dec. 2009.
    • (2009) IEEE Globecom
    • Wang, W.1    Li, H.2    Sun, Y.3    Han, Z.4
  • 11
    • 77951607794 scopus 로고    scopus 로고
    • Optimal power allocation strategy against jamming attacks using the Colonel Blotto game
    • Hawaii, Dec.
    • Y. Wu, B. Wang, and K. J. R. Liu, "Optimal power allocation strategy against jamming attacks using the Colonel Blotto game," IEEE Globecom, Hawaii, Dec. 2009.
    • (2009) IEEE Globecom
    • Wu, Y.1    Wang, B.2    Liu, K.J.R.3
  • 12
    • 77951585062 scopus 로고    scopus 로고
    • Dogfight in spectrum: Jamming and anti-jamming in multichannel cognitive radio systems
    • Dec.
    • H. Li and Z. Han, "Dogfight in spectrum: jamming and anti-jamming in multichannel cognitive radio systems," IEEE Globecom, Dec. 2009.
    • (2009) IEEE Globecom
    • Li, H.1    Han, Z.2
  • 13
    • 38149031866 scopus 로고    scopus 로고
    • Cross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks
    • Jan.
    • H. Su and X. Zhang, "Cross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 118-129, Jan. 2008.
    • (2008) IEEE Journal on Selected Areas in Communications , vol.26 , Issue.1 , pp. 118-129
    • Su, H.1    Zhang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.