메뉴 건너뛰기




Volumn 1, Issue 4, 2012, Pages 324-327

On the limitation of embedding cryptographic signature for primary transmitter authentication

Author keywords

authentication; cognitive radio network; Wireless security

Indexed keywords

AUTHENTICATION SCHEME; COGNITIVE RADIO NETWORK; COVERAGE AREA; PHYSICAL LAYERS; WIRELESS SECURITY;

EID: 84865520742     PISSN: 21622337     EISSN: 21622345     Source Type: Journal    
DOI: 10.1109/WCL.2012.050112.120059     Document Type: Article
Times cited : (19)

References (6)
  • 1
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan.
    • R. Chen, J. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks", IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.2    Reed, J.H.3
  • 2
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users' signals in cognitive radio networks via integrated cryptographic radio networks via integrated cryptographic and wireless link signatures
    • Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic radio networks via integrated cryptographic and wireless link signatures", in Proc. 2010 IEEE Symp. on Security and Privacy, pp. 286-301.
    • Proc. 2010 IEEE Symp. on Security and Privacy , pp. 286-301
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 4
    • 80051914579 scopus 로고    scopus 로고
    • Cryptographic link signatures for spectrum usage authentication in cognitive radio
    • X. Tan, K. Borle, W. Du, and B. Chen, "Cryptographic link signatures for spectrum usage authentication in cognitive radio", in Proc. 2011 ACM WiSec, pp. 79-90.
    • Proc. 2011 ACM WiSec , pp. 79-90
    • Tan, X.1    Borle, K.2    Du, W.3    Chen, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.