메뉴 건너뛰기




Volumn 35, Issue 6, 2012, Pages 1691-1708

Cognitive radio network security: A survey

Author keywords

Attacks; Primary users; Radio; Secondary users; Security; Trust

Indexed keywords

ATTACKS; PRIMARY USERS; SECONDARY USERS; SECURITY; TRUST;

EID: 84867492061     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.06.006     Document Type: Review
Times cited : (82)

References (81)
  • 3
    • 60249084757 scopus 로고    scopus 로고
    • CRAHNs cognitive radio ad hoc networks
    • I.F. Akyildiz CRAHNs cognitive radio ad hoc networks Ad Hoc Networks 7 2009 810 836
    • (2009) Ad Hoc Networks , vol.7 , pp. 810-836
    • Akyildiz, I.F.1
  • 8
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • V. Bhuse, and A. Gupta Anomaly intrusion detection in wireless sensor networks Journal of High Speed Networks 15 1 2006 33 51
    • (2006) Journal of High Speed Networks , vol.15 , Issue.1 , pp. 33-51
    • Bhuse, V.1    Gupta, A.2
  • 9
    • 51749122004 scopus 로고    scopus 로고
    • Security in cognitive radio networks: The required evaluation in approaches to wireless network security
    • Singapore
    • Burbank JL. Security in cognitive radio networks: the required evaluation in approaches to wireless network security. In: Proc. of 3rd international conference on CrownCom. Singapore; 2008. p. 1-7.
    • (2008) Proc. of 3rd International Conference on CrownCom , pp. 1-7
    • Burbank, J.L.1
  • 24
    • 46649107735 scopus 로고    scopus 로고
    • Opportunistic spectrum access in fading channels through collaborative sensing
    • A. Ghasemi, and E.S. Sousa Opportunistic spectrum access in fading channels through collaborative sensing Journal of Communications (JCM) 2 2 2007 71 82
    • (2007) Journal of Communications (JCM) , vol.2 , Issue.2 , pp. 71-82
    • Ghasemi, A.1    Sousa, E.S.2
  • 26
    • 13844296408 scopus 로고    scopus 로고
    • Cognitive radio brain-empowered wireless communications
    • S. Haykin Cognitive radio brain-empowered wireless communications IEEE Journal on Selected Areas in Communications 23 2 2005 201 220
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.2 , pp. 201-220
    • Haykin, S.1
  • 32
    • 75949119898 scopus 로고    scopus 로고
    • Emerging cognitive radio technology principles, challenges and opportunities
    • L. Khalid, and A. Anpalagan Emerging cognitive radio technology principles, challenges and opportunities Journal of Computers and Electrical Engineering 36 2 2010 358 366
    • (2010) Journal of Computers and Electrical Engineering , vol.36 , Issue.2 , pp. 358-366
    • Khalid, L.1    Anpalagan, A.2
  • 33
    • 79956099414 scopus 로고    scopus 로고
    • Location-based authentication protocol for first cognitive radio networking standard
    • H.S. Kim Location-based authentication protocol for first cognitive radio networking standard Journal of Network and Computer Applications 34 4 2011 1160 1167
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.4 , pp. 1160-1167
    • Kim, H.S.1
  • 34
    • 55149098083 scopus 로고    scopus 로고
    • Optimal spectrum sensing framework for cognitive radio networks
    • W.Y. Lee, and I. Akyildiz Optimal spectrum sensing framework for cognitive radio networks IEEE Transactions on Wireless Communications 7 10 2008 3845 3857
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.10 , pp. 3845-3857
    • Lee, W.Y.1    Akyildiz, I.2
  • 38
    • 77951585062 scopus 로고    scopus 로고
    • Dogfight in spectrum: Jamming and anti-jamming in multichannel cognitive radio systems
    • Honolulu, Hawaii
    • Li H, Han Z. Dogfight in spectrum: jamming and anti-jamming in multichannel cognitive radio systems. In: Proceedings of IEEE conference on global telecommunications. Honolulu, Hawaii, 2009. p. 1-6.
    • (2009) Proceedings of IEEE Conference on Global Telecommunications , pp. 1-6
    • Li, H.1    Han, Z.2
  • 48
    • 50949095981 scopus 로고    scopus 로고
    • Security vulnerabilities in channel assignment of multi-radio multi-channel wireless mesh networks
    • San Francisco, California, USA
    • Naveed A, Kanhere SS. Security vulnerabilities in channel assignment of multi-radio multi-channel wireless mesh networks. In: Proceedings of the IEEE GLOBECOM. San Francisco, California, USA; 2006b. p. 1-5.
    • (2006) Proceedings of the IEEE GLOBECOM , pp. 1-5
    • Naveed, A.1    Kanhere, S.S.2
  • 52
    • 70450201780 scopus 로고    scopus 로고
    • Optimization of cooperative sensing in cognitive radio networks a sensing-throughput tradeoff view
    • E. Peh, Y.-C. Liang, Y.L. Guan, and Y. Zeng Optimization of cooperative sensing in cognitive radio networks a sensing-throughput tradeoff view IEEE Transactions on Vehicular Technology 58 9 2009 5294 5299
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.9 , pp. 5294-5299
    • Peh, E.1    Liang, Y.-C.2    Guan, Y.L.3    Zeng, Y.4
  • 60
    • 79960901083 scopus 로고    scopus 로고
    • Policy controlled self-configuration in unattended wireless sensor networks
    • M. Sudip, and J. Ankur Policy controlled self-configuration in unattended wireless sensor networks Journal of Network and Computer Applications 34 5 2011 1530 1544
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.5 , pp. 1530-1544
    • Sudip, M.1    Ankur, J.2
  • 66
    • 77956266464 scopus 로고    scopus 로고
    • Game theory for cognitive radio networks an overview
    • B. Wang, Y. Wu, and K.J.R. Liu Game theory for cognitive radio networks an overview Journal of Computer Networks 54 14 2010 2537 2561
    • (2010) Journal of Computer Networks , vol.54 , Issue.14 , pp. 2537-2561
    • Wang, B.1    Wu, Y.2    Liu, K.J.R.3
  • 68
    • 78649332013 scopus 로고    scopus 로고
    • A novel node level security policy framework for wireless sensor networks
    • R.C. William, and S. Dongwan A novel node level security policy framework for wireless sensor networks Journal of Network and Computer Applications 34 1 2011 418 428
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 418-428
    • William, R.C.1    Dongwan, S.2
  • 72
    • 82155166403 scopus 로고    scopus 로고
    • Reinforcement learning for context awareness and intelligence in wireless networks review, new features and open issues
    • K.-L.A. Yau Reinforcement learning for context awareness and intelligence in wireless networks review, new features and open issues Journal of Network and Computer Applications 35 1 2012 253 267
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.1 , pp. 253-267
    • Yau, K.-L.A.1
  • 73
    • 70349185618 scopus 로고    scopus 로고
    • A survey of spectrum sensing algorithms for cognitive radio applications
    • Yucek T, Arslan H. A survey of spectrum sensing algorithms for cognitive radio applications. In: IEEE communications surveys and tutorials, 2009. p. 116-30.
    • (2009) IEEE Communications Surveys and Tutorials , pp. 116-130
    • Yucek, T.1    Arslan, H.2
  • 78
    • 33745977842 scopus 로고    scopus 로고
    • Device-centric spectrum management
    • Baltimore, USA
    • Zheng H, Cao L. Device-centric spectrum management. In: Proceedings of IEEE DySPAN. Baltimore, USA; 2005. p. 56-65.
    • (2005) Proceedings of IEEE DySPAN , pp. 56-65
    • Zheng, H.1    Cao, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.