메뉴 건너뛰기




Volumn , Issue , 2008, Pages 120-124

Cognitive radio network architecture: Part II - Trusted network layer structure

Author keywords

cognitive radio network; heterogeneous wireless networks; security; trusted routing; ubiquitous computing; wireless networks

Indexed keywords

COGNITIVE RADIO; COGNITIVE RADIO NETWORK; CRITICAL FACTORS; HETEROGENEOUS WIRELESS NETWORKS; LAYER STRUCTURES; MATHEMATICAL FRAMEWORKS; MULTIHOP WIRELESS; NETWORK OPERATIONS; SECURITY; TRUSTED NETWORK; TRUSTED ROUTING;

EID: 79959350707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352793.1352818     Document Type: Conference Paper
Times cited : (53)

References (23)
  • 2
    • 33745648091 scopus 로고    scopus 로고
    • NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
    • 15 September
    • F. Akyildiz, W. -Y. Lee, M. C. Vuran, S. Mohanty. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks, Volume 50, Issue 13, 15 September 2006, Pages 2127-2159.
    • (2006) Computer Networks , vol.50 , Issue.13 , pp. 2127-2159
    • Akyildiz, F.1    Lee, W.Y.2    Vuran, M.C.3    Mohanty, S.4
  • 6
    • 84868331998 scopus 로고    scopus 로고
    • A survey of integrating IP mobility protocols and mobile ad hoc networks
    • First Quarter
    • F. M. Aduljalil and S. K. Bodhe. A survey of integrating IP mobility protocols and mobile ad hoc networks. IEEE Communications Surveys & Tutorials, vol.9, no.1, pp.14-30, First Quarter 2007.
    • (2007) IEEE Communications Surveys & Tutorials , vol.9 , Issue.1 , pp. 14-30
    • Aduljalil, F.M.1    Bodhe, S.K.2
  • 8
    • 34147173361 scopus 로고    scopus 로고
    • A Survey on Perr-to-Peer KeyMangement for Mobile Ad Hoc Networks
    • April
    • J. Van Der Merwe, D. Dawoud, S. McDonald. A Survey on Perr-to-Peer KeyMangement for Mobile Ad Hoc Networks. ACM Computing Survey, Vol. 39, No. 1, April 2007.
    • (2007) ACM Computing Survey , vol.39 , Issue.1
    • Van Der Merwe, J.1    Dawoud, D.2    McDonald, S.3
  • 9
    • 3142695378 scopus 로고    scopus 로고
    • End-to-end QoS provisioning in mobile heterogeneous networks
    • June
    • X. Gao, G. Wu and T. Miki. End-to-end QoS provisioning in mobile heterogeneous networks. IEEE Wireless Communications, vol.11, no.3, pp. 24-34, June 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.3 , pp. 24-34
    • Gao, X.1    Wu, G.2    Miki, T.3
  • 10
    • 13844296408 scopus 로고    scopus 로고
    • Cognitive radio: Brain-empowered wireless communications
    • Feb.
    • S. Haykin. Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, vol.23, no.2, pp. 201-220, Feb. 2005.
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.2 , pp. 201-220
    • Haykin, S.1
  • 11
    • 21944433610 scopus 로고    scopus 로고
    • Issues in integrating cellular networks WLANs, and MANETs: A futuristic heterogeneous wireless network
    • June
    • D. Cavalcanti, D. Agrawal, C. Cordeiro, B. Xie and A. Kumar. Issues in integrating cellular networks WLANs, and MANETs: a futuristic heterogeneous wireless network. IEEE Wireless Communications Magazine, vol.12, no.3, pp. 30-41, June 2005.
    • (2005) IEEE Wireless Communications Magazine , vol.12 , Issue.3 , pp. 30-41
    • Cavalcanti, D.1    Agrawal, D.2    Cordeiro, C.3    Xie, B.4    Kumar, A.5
  • 13
    • 0001987976 scopus 로고    scopus 로고
    • IP mobility support
    • Oct.
    • C.E. Perkins. IP mobility support. IETF RFC 2002, Oct. 1996.
    • (1996) IETF RFC , vol.2002
    • Perkins, C.E.1
  • 16
    • 84892591410 scopus 로고    scopus 로고
    • A survey of security issues in mobile ad hoc and sensor networks
    • Fourth Quarter
    • D. Djenouri, L. Khelladi, A. N. Badache. A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys & Tutorials, vol.7, no.4, pp. 2-28, Fourth Quarter 2005.
    • (2005) IEEE Communications Surveys & Tutorials , vol.7 , Issue.4 , pp. 2-28
    • Djenouri, D.1    Khelladi, L.2    Badache, A.N.3
  • 17
    • 0242709310 scopus 로고    scopus 로고
    • Dynamic Access Control: Preserving Safety and Trust for Network Defense Operations
    • P. Naldurg, R.H. Campbell. Dynamic Access Control: Preserving Safety and Trust for Network Defense Operations. ACM SACMAT, 2003.
    • (2003) ACM SACMAT
    • Naldurg, P.1    Campbell, R.H.2
  • 22
    • 29844453185 scopus 로고    scopus 로고
    • Towards Designing a Trusted Routing Solution in Moile Ad Hoc Networks
    • T. Ghosh, N. Pissinou, K. Makki. Towards Designing a Trusted Routing Solution in Moile Ad Hoc Networks. Mobile Networks and Applications, pp.985-995, 2005.
    • (2005) Mobile Networks and Applications , pp. 985-995
    • Ghosh, T.1    Pissinou, N.2    Makki, K.3
  • 23
    • 68349163943 scopus 로고    scopus 로고
    • Cognitive Radio Network Architecture: Part I - General Structure
    • K.C. Chen, et al. Cognitive Radio Network Architecture: Part I - General Structure. ACM ICUIMC, Seoul, 2008.
    • ACM ICUIMC, Seoul, 2008
    • Chen, K.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.