메뉴 건너뛰기




Volumn 100, Issue 12, 2012, Pages 3172-3186

A survey of security challenges in cognitive radio networks: Solutions and future research directions

Author keywords

Cognitive radio (CR); denial of service (DoS); incumbent emulation; security; spectrum sensing data falsification (SSDF)

Indexed keywords

DENIAL-OF-SERVICE ATTACK; NETWORK SECURITY; RADIO SYSTEMS; SECURE COMMUNICATION; SURVEYS;

EID: 84869508857     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2012.2208211     Document Type: Review
Times cited : (257)

References (79)
  • 1
    • 85008048349 scopus 로고    scopus 로고
    • IEEE 802.22: The first cognitive radio wireless regional area network standard
    • Jan
    • C. Stevenson, G. Chouinard, L. Zhongding, W. Hu, S. Shellhammer, and W. Caldwell, BIEEE 802.22: The first cognitive radio wireless regional area network standard,[ IEEE Commun. Mag., vol. 47, no. 1, pp .130-138, Jan. 2009.
    • (2009) IEEE Commun. Mag , vol.47 , Issue.1 , pp. 130-138
    • Stevenson, C.1    Chouinard, G.2    Zhongding, L.3    Hu, W.4    Shellhammer, S.5    Caldwell, W.6
  • 2
    • 42649140294 scopus 로고    scopus 로고
    • Cognitive functionality in next generation wireless networks: Standardization efforts
    • DOI 10.1109/MCOM.2008.4481343
    • R. V. Prasad, P. Pawelczak, J. A. Hoffmeyer, and H. S. Berger, BCognitive functionality in next generation wireless networks: Standardization efforts,[ IEEE Commun. Mag., vol. 46, no. 4, pp. 72-78, Apr. 2008. (Pubitemid 351593410)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 72-78
    • Prasad, R.V.1    Pawiczak, P.2    Hoffmeyer, J.A.3    Berger, H.S.4
  • 3
    • 52549109488 scopus 로고    scopus 로고
    • Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
    • Oct
    • T. X. Brown and A. Sethi, BPotential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment,[ Mobile Net. Appl., vol. 13, no. 5, pp. 516-532, Oct. 2008.
    • (2008) Mobile Net. Appl , vol.13 , Issue.5 , pp. 516-532
    • Brown, T.X.1    Sethi, A.2
  • 4
    • 51749120340 scopus 로고    scopus 로고
    • Security in cognitive radio networks: Threats and mitigation
    • Singapore May 15-17 DOI: 10.1109/CROWNCOM20084562534
    • T. C. Clancy and N. Goergen, BSecurity in cognitive radio networks: Threats and mitigation,[ in Proc. Int. Conf. Cogn. Radio Oriented Wireless Netw. Commun., Singapore, May 15-17, 2008, DOI: 10.1109/CROWNCOM.2008.4562534.
    • (2008) Proc. Int. Conf. Cogn. Radio Oriented Wireless Netw. Commun.
    • Clancy, T.C.1    Goergen, N.2
  • 5
    • 51749122004 scopus 로고    scopus 로고
    • Security in cognitive radio networks: The required evolution in approaches to wireless network security
    • Singapore May 15-17 DOI: 10.1109/CROWNCOM20084562536
    • J. L. Burbank, BSecurity in cognitive radio networks: The required evolution in approaches to wireless network security,[ in Proc. Int. Conf. Cogn. Radio Oriented Wireless Netw. Commun., Singapore, May 15-17, 2008, DOI: 10.1109/CROWNCOM.2008.4562536.
    • (2008) Proc. Int. Conf. Cogn. Radio Oriented Wireless Netw. Commun.
    • Burbank, J.L.1
  • 6
    • 77951429767 scopus 로고    scopus 로고
    • Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard
    • Boston, MA, Oct. 18-21 DOI: 10.1109/MILCOM20095380058
    • A. N. Mody, R. Reddy, T. Kiernan, and T. X. Brown, BSecurity in cognitive radio networks: An example using the commercial IEEE 802.22 standard,[ in Proc. IEEE Military Commun. Conf., Boston, MA, Oct. 18-21, 2009, DOI: 10.1109/MILCOM.2009. 5380058.
    • (2009) Proc. IEEE Military Commun. Conf.
    • Mody, A.N.1    Reddy, R.2    Kiernan, T.3    Brown, T.X.4
  • 7
    • 77955385262 scopus 로고    scopus 로고
    • Coordinated denial-of-service attacks in IEEE 802.22 networks
    • Cape Town, South Africa, May 23-27 DOI: 10.1109/ICC.2010. 5502431
    • Y. Tan, S. Sengupta, and K. P. Subbalakshmi, BCoordinated denial-of-service attacks in IEEE 802.22 networks,[ in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 23-27, 2010, DOI: 10.1109/ICC.2010. 5502431.
    • (2010) Proc. IEEE Int. Conf. Commun.
    • Tan, Y.1    Sengupta, S.2    Subbalakshmi, K.P.3
  • 8
    • 79551641831 scopus 로고    scopus 로고
    • Denial of service attacks in cognitive radio networks through channel eviction triggering
    • Miami, FL, Dec 6-10 DOI: 10.1109/GLOCOM.2010. 5683177
    • S. Sodagari, A. Attar, V. Leung, and S. Bilen, BDenial of service attacks in cognitive radio networks through channel eviction triggering,[ in Proc. IEEE Global Telecommun. Conf., Miami, FL, Dec. 6-10, 2010, DOI: 10.1109/GLOCOM.2010. 5683177.
    • (2010) Proc. IEEE Global Telecommun. Conf.
    • Sodagari, S.1    Attar, A.2    Leung, V.3    Bilen, S.4
  • 9
    • 42549125692 scopus 로고    scopus 로고
    • Cooperative sensing among cognitive radios
    • DOI 10.1109/ICC.2006.254957, 4024390, 2006 IEEE International Conference on Communications, ICC 2006
    • S. M. Mishra, A. Sahai, and R. W. Brodersen, BCooperative sensing among cognitive radios,[ in Proc. IEEE Int. Conf. Commun., Istanbul, Turkey, Jun. 2006, vol. 4, pp. 1658-1663. (Pubitemid 351575230)
    • (2006) IEEE International Conference on Communications , vol.4 , pp. 1658-1663
    • Mishra, S.M.1    Sahai, A.2    Brodersen, R.W.3
  • 10
    • 33847674846 scopus 로고    scopus 로고
    • On the energy detection of unknown signals over fading channels
    • DOI 10.1109/TCOMM.2006.887483
    • F. F. Digham,M.-S. Alouini, andM. K. Simon, BOn the energy detection of unknown signals over fading channels,[ IEEE Trans. Commun., vol. 55, no. 1, pp. 21-24, Jan. 2007. (Pubitemid 46351039)
    • (2007) IEEE Transactions on Communications , vol.55 , Issue.1 , pp. 21-24
    • Digham, F.F.1    Alouini, M.-S.2    Simon, M.K.3
  • 11
    • 35748975694 scopus 로고    scopus 로고
    • Spectrum sensing in cognitive radio networks: The cooperation-processing tradeoff
    • DOI 10.1002/wcm.480
    • A. Ghasemi and E. S. Sousa, BSpectrum sensing in cognitive radio networks: The cooperation-processing tradeoff,[ Wireless Commun. Mobile Comput., vol. 7, no. 9, pp. 1049-1060, May 2007. (Pubitemid 350044684)
    • (2007) Wireless Communications and Mobile Computing , vol.7 , Issue.9 , pp. 1049-1060
    • Ghasemi, A.1    Sousa, E.S.2
  • 13
    • 77952740125 scopus 로고    scopus 로고
    • Sensing techniques for cognitive radioVState of the art and trends
    • Apr
    • D. Noguet et al., BSensing techniques for cognitive radioVState of the art and trends,[ in IEEE SCC41-P1900.6 White Paper, Apr. 2009.
    • (2009) IEEE SCC41-P1900.6 White Paper
    • Noguet, D.1
  • 14
    • 70349185618 scopus 로고    scopus 로고
    • A survey of spectrum sensing algorithms for cognitive radio applications
    • First Quarter
    • T. Yucek and H. Arslan, BA survey of spectrum sensing algorithms for cognitive radio applications,[ IEEE Commun. Surv. Tut., vol. 11, no. 1, pp. 116-130, First Quarter, 2009.
    • (2009) IEEE Commun. Surv. Tut , vol.11 , Issue.1 , pp. 116-130
    • Yucek, T.1    Arslan, H.2
  • 15
    • 35048873730 scopus 로고    scopus 로고
    • Communication system recognition by modulation recognition
    • Fortaleza Brazil Aug. 1-7 DOI: 10.1007/978-3-540-27824-516
    • A. Attar, A. Sheikhi, and A. Zamani, BCommunication system recognition by modulation recognition,[ in Proc. 11th Int. Conf. Telecommun., Fortaleza, Brazil, Aug. 1-7, 2004, pp. 106-113, DOI: 10.1007/978-3-540-27824-516.
    • (2004) Proc. 11th Int. Conf. Telecommun. , pp. 106-113
    • Attar, A.1    Sheikhi, A.2    Zamani, A.3
  • 16
    • 78649243403 scopus 로고    scopus 로고
    • Quickest detection in multiple ON-OFF processes
    • Dec
    • Q. Zhao and J. Ye, BQuickest detection in multiple ON-OFF processes,[ IEEE Trans. Signal Process., vol. 58, no. 12, pp. 5994-6006, Dec. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.12 , pp. 5994-6006
    • Zhao, Q.1    Ye, J.2
  • 18
    • 77952492719 scopus 로고    scopus 로고
    • Biologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios
    • May-Jun
    • F. R. Yu, M. Huang, and H. Tang, BBiologically inspired consensus-based spectrum sensing in mobile Ad Hoc networks with cognitive radios,[ IEEE Networks, vol. 24, no. 3, pp. 26-30, May-Jun. 2010.
    • (2010) IEEE Networks , vol.24 , Issue.3 , pp. 26-30
    • Yu, F.R.1    Huang, M.2    Tang, H.3
  • 19
    • 36348966535 scopus 로고    scopus 로고
    • BIOlogically-inspired spectrum sharing in cognitive radio networks
    • DOI 10.1109/WCNC.2007.14, 4204190, 2007 IEEE Wireless Communications and Networking Conference, WCNC 2007
    • B. Atakan and O. B. Akan, BBiologically-inspired spectrum sharing in cognitive radio networks,[ in Proc. IEEE Wireless Commun. Netw. Conf., Hong Kong, Mar. 11-15, 2007, pp. 43-48. (Pubitemid 350139364)
    • (2007) IEEE Wireless Communications and Networking Conference, WCNC , pp. 43-48
    • Baris, A.1    Akan, O.B.2
  • 20
    • 76849089351 scopus 로고    scopus 로고
    • A distributed consensus-based cooperative spectrum-sensing scheme in cognitive radios
    • Jan
    • Z. Li, F. R. Yu, and M. Huang, BA distributed consensus-based cooperative spectrum-sensing scheme in cognitive radios,[ IEEE Trans. Veh. Technol., vol. 59, no. 1, pp. 383-393, Jan. 2010.
    • (2010) IEEE Trans. Veh. Technol , vol.59 , Issue.1 , pp. 383-393
    • Li, Z.1    Yu, F.R.2    Huang, M.3
  • 21
    • 13844296408 scopus 로고    scopus 로고
    • Cognitive radio: Brain-empowered wireless communications
    • DOI 10.1109/JSAC.2004.839380
    • S. Haykin, BCognitive radio: Brain-empowered wireless communications,[ IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005. (Pubitemid 40245487)
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.2 , pp. 201-220
    • Haykin, S.1
  • 22
    • 84890916209 scopus 로고    scopus 로고
    • Cognitive medium access: Exploration exploitation and competition
    • Feb
    • L. Lifeng, H. El Gamal, J. Hai, and H. V. Poor, BCognitive medium access: Exploration, exploitation, and competition,[ IEEE Trans. Mobile Comput., vol. 10, no. 2, pp. 239-253, Feb. 2011.
    • (2011) IEEE Trans. Mobile Comput , vol.10 , Issue.2 , pp. 239-253
    • Lifeng, L.1    El Gamal, H.2    Hai, J.3    Poor, H.V.4
  • 24
    • 70349664565 scopus 로고    scopus 로고
    • BCommon Control Channel Security Framework for Cognitive Radio Networks
    • Spring, Barcelona, Spain, Apr. 26-29 DOI: 10.1109/VETECS. 2009.5073450
    • G. A. Safdar and M. O'Neill, BCommon control channel security framework for cognitive radio networks,[ in Proc. IEEE Veh. Technol. Conf. Spring, Barcelona, Spain, Apr. 26-29, 2009, DOI: 10.1109/VETECS. 2009.5073450.
    • (2009) Proc. IEEE Veh. Technol. Conf.
    • Safdar, G.A.1    O'Neill, M.2
  • 25
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan
    • R. Chen, J.-M. Park, and J. H. Reed, BDefense against primary user emulation attacks in cognitive radio networks,[ IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
    • (2008) IEEE J. Sel Areas Commun , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.-M.2    Reed, J.H.3
  • 26
    • 71949106409 scopus 로고    scopus 로고
    • Attack-tolerant distributed sensing for dynamic spectrum access networks
    • Princeton, NJ, Oct. 13-16
    • A. W. Min, K. G. Shin, and X. Hu, BAttack-tolerant distributed sensing for dynamic spectrum access networks,[ in Proc. 17th IEEE Int. Conf. Netw. Protocols, Princeton, NJ, Oct. 13-16, 2009, pp. 294-303.
    • (2009) Proc. 17th IEEE Int. Conf. Netw. Protocols , pp. 294-303
    • Min, A.W.1    Shin, K.G.2    Hu, X.3
  • 27
    • 77954320949 scopus 로고    scopus 로고
    • Towards a trust aware cognitive radio architecture
    • Apr
    • T. Qin, H. Yu, C. Leung, Z. Shen, and C.Miao, BTowards a trust aware cognitive radio architecture,[ ACM Mobile Comput. Commun. Rev., vol. 13, no. 2, pp. 86-95, Apr. 2009.
    • (2009) ACM Mobile Comput. Commun. Rev , vol.13 , Issue.2 , pp. 86-95
    • Qin, T.1    Yu, H.2    Leung, C.3    Shen, Z.4    Miao, C.5
  • 28
    • 70349659935 scopus 로고    scopus 로고
    • Attack-proof collaborative spectrum sensing in cognitive radio networks
    • Baltimore MD Mar
    • W. Wangz, H. Liy, Y. Sunz, and Z. Han, BAttack-proof collaborative spectrum sensing in cognitive radio networks,[ in Proc. Conf. Inf. Sci. Syst., Baltimore, MD, Mar. 2009, pp. 130-134.
    • (2009) Proc. Conf. Inf. Sci. Syst. , pp. 130-134
    • Wangz, W.1    Liy, H.2    Sunz, Y.3    Han, Z.4
  • 29
    • 51249091375 scopus 로고    scopus 로고
    • Secure cooperative sensing techniques for cognitive radio systems
    • Beijing, China, May
    • P. Kaligineedi, M. Khabbazian, and V. K. Bhargava, BSecure cooperative sensing techniques for cognitive radio systems,[ in Proc. IEEE Int. Conf. Commun., Beijing, China, May 2008, pp. 3406-3410.
    • (2008) Proc. IEEE Int. Conf. Commun. , pp. 3406-3410
    • Kaligineedi, P.1    Khabbazian, M.2    Bhargava, V.K.3
  • 30
    • 77954929710 scopus 로고    scopus 로고
    • A robust and efficient cooperative spectrum sensing scheme in cognitive radio networks
    • Cape Town, South Africa, May DOI: 10.1109/ICCW. 2010.5503968
    • F. Gao, W. Yuan, W. Liu, W. Cheng, and S. Wang, BA robust and efficient cooperative spectrum sensing scheme in cognitive radio networks,[ in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 23-27, 2010, DOI: 10.1109/ICCW. 2010.5503968.
    • (2010) Proc. IEEE Int. Conf. Commun. , pp. 23-27
    • Gao, F.1    Yuan, W.2    Liu, W.3    Cheng, W.4    Wang, S.5
  • 31
    • 42649135628 scopus 로고    scopus 로고
    • Toward secure distributed spectrum sensing in cognitive radio networks
    • DOI 10.1109/MCOM.2008.4481340
    • R. Chen, J.-M. Park, Y. T. Hou, and J. H. Reed, BToward secure distributed spectrum sensing in cognitive radio networks,[ IEEE Commun. Mag., vol. 46, no. 4, pp. 50-55, Apr. 2008. (Pubitemid 351593407)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 50-55
    • Chen, R.1    Park, J.-M.2    Hou, Y.T.3    Reed, J.H.4
  • 32
    • 77951486373 scopus 로고    scopus 로고
    • Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios
    • Boston, MA Oct DOI: 10.1109/MILCOM. 2009.5379832
    • F. R. Yu, H. Tang, M. Huang, Z. Li, and P. C. Mason, BDefense against spectrum sensing data falsification attacks in mobile Ad Hoc networks with cognitive radios,[ in Proc. IEEE Military Commun. Conf., Boston, MA, Oct. 2009, DOI: 10.1109/MILCOM. 2009.5379832.
    • (2009) Proc. IEEE Military Commun Conf.
    • Yu, F.R.1    Tang, H.2    Huang, M.3    Li, Z.4    Mason, P.C.5
  • 34
    • 65949084488 scopus 로고    scopus 로고
    • Cognitive radio game for secondary spectrum access problem
    • Apr
    • A. Attar, M. R. Nakahi, and A. H. Aghvami, BCognitive radio game for secondary spectrum access problem,[ IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 2121-2131, Apr. 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.8 , Issue.4 , pp. 2121-2131
    • Attar, A.1    Nakahi, M.R.2    Aghvami, A.H.3
  • 35
  • 36
    • 34247229185 scopus 로고    scopus 로고
    • Decentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework
    • Apr
    • Q. Zhao, L. Tong, A. Swami, and Y. Chen, BDecentralized cognitive MAC for opportunistic spectrum access in Ad Hoc networks: A POMDP framework,[ IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 589-600, Apr. 2007.
    • (2007) IEEE J. Sel. Areas Commun , vol.25 , Issue.3 , pp. 589-600
    • Zhao, Q.1    Tong, L.2    Swami, A.3    Chen, Y.4
  • 37
  • 38
    • 76949096171 scopus 로고    scopus 로고
    • Betting on gilbert-elliot channels
    • Feb
    • A. Laourine and L. Tong, BBetting on Gilbert-Elliot channels,[ IEEE Trans. Wireless Commun., vol. 9, no. 2, pp. 723-733, Feb. 2010.
    • (2010) IEEE Trans. Wireless Commun , vol.9 , Issue.2 , pp. 723-733
    • Laourine, A.1    Tong, L.2
  • 39
    • 79953827701 scopus 로고    scopus 로고
    • Distributed learning in multi-armed bandit with multiple players
    • Nov
    • K. Liu and Q. Zhao, BDistributed learning in multi-armed bandit with multiple players,[ IEEE Trans. Signal Process., vol. 58, no. 11, pp. 5667-5681, Nov. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.11 , pp. 5667-5681
    • Liu, K.1    Zhao, Q.2
  • 41
    • 0004049893 scopus 로고
    • Ph.D. dissertation, Faculty Comput. Sci. Technol., Univ. Cambridge, Cambridge, U.K.
    • C. J. C. H. Watkins, BLearning from delayed rewards,[ Ph.D. dissertation, Faculty Comput. Sci. Technol., Univ. Cambridge, Cambridge, U.K., 1989.
    • (1989) BLearning from Delayed Rewards
    • Watkins, C.J.C.H.1
  • 44
    • 79956100559 scopus 로고    scopus 로고
    • Jamming in wireless networks under uncertainty
    • Nov.
    • E. Altman, K. Avrachenkov, and A. Garnaev, BJamming in wireless networks under uncertainty,[ Mobile Netw. Appl., vol. 16, no. 2, pp. 246-254, Nov. 2010.
    • (2010) Mobile Netw. Appl , vol.16 , Issue.2 , pp. 246-254
    • Altman, E.1    Avrachenkov, K.2    Garnaev, A.3
  • 45
    • 61349186445 scopus 로고    scopus 로고
    • Capacity of cognitive interference channels with and without secrecy
    • Feb
    • Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, BCapacity of cognitive interference channels with and without secrecy,[ IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 604-619
    • Liang, Y.1    Somekh-Baruch, A.2    Poor, H.V.3    Shamai, S.4    Verdu, S.5
  • 46
    • 78751615533 scopus 로고    scopus 로고
    • Two types of attacks against cognitive radio network MAC protocols
    • Wuhan, China Dec
    • L. Zhu and H. Zhou, BTwo types of attacks against cognitive radio network MAC protocols,[ in Proc. Int. Conf. Comput. Sci. Softw. Eng., Wuhan, China, Dec. 2008, vol. 4, pp. 1110-1113.
    • (2008) Proc. Int. Conf. Comput. Sci. Softw. Eng. , vol.4 , pp. 1110-1113
    • Zhu, L.1    Zhou, H.2
  • 47
    • 80052019080 scopus 로고    scopus 로고
    • Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation
    • Oct
    • A. W. Min, K. G. Shin, and X. Hu, BSecure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation,[ IEEE Trans. Mobile Comput., vol. 10, no. 10, pp. 1434-1447, Oct. 2011.
    • (2011) IEEE Trans. Mobile Comput , vol.10 , Issue.10 , pp. 1434-1447
    • Min, A.W.1    Shin, K.G.2    Hu, X.3
  • 49
    • 77956948315 scopus 로고    scopus 로고
    • A survey of trust and reputation management systems in wireless communications
    • Oct
    • H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, BA survey of trust and reputation management systems in wireless communications,[ Proc. IEEE, vol. 98, no. 10, pp. 1755-1772, Oct. 2010.
    • (2010) Proc. IEEE , vol.98 , Issue.10 , pp. 1755-1772
    • Yu, H.1    Shen, Z.2    Miao, C.3    Leung, C.4    Niyato, D.5
  • 50
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • DOI 10.1109/MPRV.2004.21
    • D. Dagon, T. Martin, and T. Starner, BMobile phones as computing devices: The viruses are coming![ IEEE Pervasive Comput., vol. 3, no. 4, pp. 11-15, Oct.-Dec. 2004. (Pubitemid 40010893)
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 51
    • 66349131932 scopus 로고    scopus 로고
    • Understanding the spreading patterns of mobile phone viruses
    • May
    • P. Wang, M. C. González, C. A. Hidalgo, and A.-L. Barabási, BUnderstanding the spreading patterns of mobile phone viruses,[ Science, vol. 32, no. 5930, pp. 1071-1076, May 2009.
    • (2009) Science , vol.32 , Issue.5930 , pp. 1071-1076
    • Wang, P.1    González, M.C.2    Hidalgo, C.A.3    Barabási, A.-L.4
  • 52
    • 50249185601 scopus 로고    scopus 로고
    • Dynamic scalable software downloads for mobile terminal mass-upgrades
    • Budapest Hungary Jul DOI: 10.1109/ISTMWC20074299035
    • O. Holland and A. H. Aghvami, BDynamic scalable software downloads for mobile terminal mass-upgrades,[ in Proc. IST Mobile Wireless Commun. Summit, Budapest, Hungary, Jul. 2007, DOI: 10.1109/ISTMWC. 2007.4299035.
    • (2007) Proc. IST Mobile Wireless Commun. Summit
    • Holland, O.1    Aghvami, A.H.2
  • 54
    • 39349088878 scopus 로고    scopus 로고
    • Design of anti-jamming coding for cognitive radio
    • DOI 10.1109/GLOCOM.2007.797, 4411707, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
    • G. Yue, X. Wang, and M. Madihian, BDesign of anti-jamming coding for cognitive radio,[ in Proc. IEEE Global Telecommun. Conf., Washington, DC, Nov. 26-30, 2007, pp .4190-4194. (Pubitemid 351259782)
    • (2007) GLOBECOM - IEEE Global Telecommunications Conference , pp. 4190-4194
    • Guosen, Y.1    Xiaodong, W.2    Madihian, M.3
  • 55
    • 79953200186 scopus 로고    scopus 로고
    • An Anti-jamming stochastic game for cognitive radio networks
    • Ar
    • B.Wang, Y. Wu, K. J. R. Liu, and T. C. Clancy, BAn anti-jamming stochastic game for cognitive radio networks,[ IEEE J. Sel. Areas Commun., vol. 29, no. 4, pp. 877-889, Apr. 2011.
    • (2011) IEEE J. Sel Areas Commun , vol.29 , Issue.4 , pp. 877-889
    • Wang, B.1    Wu, Y.2    Liu, K.J.R.3    Clancy, T.C.4
  • 56
    • 58349115014 scopus 로고    scopus 로고
    • Lightweight integrated authentication for tactical MANETS
    • Zhangjiajie, China, Nov. 18-21
    • H. Tang and M. Salmanian, BLightweight integrated authentication for tactical MANETS,[ in Proc. IEEE 9th Int. Conf. Young Comput. Sci., Zhangjiajie, China, Nov. 18-21, 2008, pp. 2266-2271.
    • (2008) Proc. IEEE 9th Int. Conf. Young Comput. Sci. , pp. 2266-2271
    • Tang, H.1    Salmanian, M.2
  • 58
    • 85008009601 scopus 로고    scopus 로고
    • A hierarchical identity based key management scheme in tactical mobile Ad Hoc networks
    • Dec
    • F. R. Yu, H. Tang, P. C. Mason, and F. Wang, BA hierarchical identity based key management scheme in tactical mobile Ad Hoc networks,[ IEEE Trans. Netw. Services Manage., vol. 7, no. 4, pp. 1932-4537, Dec. 2010.
    • (2010) IEEE Trans. Netw. Services Manage , vol.7 , Issue.4 , pp. 1932-4537
    • Yu, F.R.1    Tang, H.2    Mason, P.C.3    Wang, F.4
  • 59
    • 39049144353 scopus 로고    scopus 로고
    • Secrecy capacity of wireless channels
    • DOI 10.1109/ISIT.2006.261613, 4035982, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
    • J. Barros and M. R. D. Rodrigues, BSecrecy capacity of wireless channels,[ in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 356-360. (Pubitemid 351244113)
    • (2006) IEEE International Symposium on Information Theory - Proceedings , pp. 356-360
    • Barros, J.1    Rodrigues, M.R.D.2
  • 60
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct
    • P. K. Gopala, L. Lifeng, and H. El Gamal, BOn the secrecy capacity of fading channels,[ IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lifeng, L.2    El Gamal, H.3
  • 61
    • 52349090496 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Toronto ON Canada Jul. 6-11
    • F. Oggier and B. Hassibi, BThe secrecy capacity of the MIMO wiretap channel,[ in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 6-11, 2008, pp. 524-528.
    • (2008) Proc. IEEE Int. Symp. Inf. Theory , pp. 524-528
    • Oggier, F.1    Hassibi, B.2
  • 62
    • 51649109883 scopus 로고    scopus 로고
    • On the secrecy capacity of fading wireless channel with multiple eavesdroppers
    • Nice, France, Jun. 24-29
    • P. Wang, G. Yu, and Z. Zhang, BOn the secrecy capacity of fading wireless channel with multiple eavesdroppers,[ in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 24-29, 2007, pp. 1301-1305.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 1301-1305
    • Wang, P.1    Yu, G.2    Zhang, Z.3
  • 63
    • 79956152661 scopus 로고    scopus 로고
    • Distributed coalition formation games for secure wireless transmission
    • Nov.
    • W. Saad, Z. Han, T. Basar, M. Debbah, and A. Hjørungnes, BDistributed coalition formation games for secure wireless transmission,[ Mobile Netw. Appl., vol. 16, no. 2, pp. 231-245, Nov. 2010.
    • (2010) Mobile Netw. Appl , vol.16 , Issue.2 , pp. 231-245
    • Saad, W.1    Han, Z.2    Basar, T.3    Debbah, M.4    Hjørungnes, A.5
  • 64
    • 84856161231 scopus 로고    scopus 로고
    • A survey on trust management for mobile Ad Hoc networks
    • First Quarter
    • J.-H. Cho, A. Swami, and I.-R. Chen, BA survey on trust management for mobile Ad Hoc networks,[ IEEE Commun. Surv. Tut., vol. 11, no. 1, pp. 116-130, First Quarter, 2009.
    • (2009) IEEE Commun. Surv. Tut , vol.11 , Issue.1 , pp. 116-130
    • Cho, J.-H.1    Swami, A.2    Chen, I.-R.3
  • 65
    • 78651526244 scopus 로고    scopus 로고
    • Game theoretic issues in cognitive radio systems
    • Nov
    • J. W. Huang and V. Krishnamurthy, BGame theoretic issues in cognitive radio systems,[ J. Commun., vol. 4, no. 10, pp. 790-802, Nov. 2009.
    • (2009) J. Commun , vol.4 , Issue.10 , pp. 790-802
    • Huang, J.W.1    Krishnamurthy, V.2
  • 66
    • 33847126272 scopus 로고    scopus 로고
    • Constrained bandwidth allocation in multi-sensor information fusion: A mechanism design approach
    • DOI 10.1109/ICIF.2005.1591991, 1591991, 2005 7th International Conference on Information Fusion, FUSION
    • R. K. Dash, A. Rogers, N. R. Jennings, S. Reece, and S. Roberts, BConstrained bandwidth allocation in multisensor information fusion: A mechanism design approach,[ in Proc. IEEE Inf. Fusion Conf., Philadelphia, PA, Jul. 2005, pp. 1185-1192. (Pubitemid 46276341)
    • (2005) 2005 7th International Conference on Information Fusion, FUSION , vol.2 , pp. 1185-1192
    • Dash, R.K.1    Rogers, A.2    Jennings, N.R.3    Reece, S.4    Roberts, S.5
  • 67
    • 0032022195 scopus 로고    scopus 로고
    • On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas
    • G. J. Foschini and M. J. Gans, BOn limits of wireless communications in a fading environment when using multiple antennas,[ Wireless Pers. Commun., vol. 6, pp. 311-335, 1998. (Pubitemid 128513099)
    • (1998) Wireless Personal Communications , vol.6 , Issue.3 , pp. 311-335
    • Foschini, G.J.1    Gans, M.J.2
  • 68
    • 0032118152 scopus 로고    scopus 로고
    • Robust channel estimation for OFDM systems with rapid dispersive fading channels
    • PII S0090677898051691
    • Y. Li, L. J. Cimini, and N. R. Sollenberger, BRobust channel estimation for OFDM systems with rapid dispersive fading channels,[ IEEE Trans. Commun., vol. 46, no. 7, pp. 902-915, Jul. 1998. (Pubitemid 128739441)
    • (1998) IEEE Transactions on Communications , vol.46 , Issue.7 , pp. 902-915
    • Li, Y.1    Cimini Jr., L.J.2    Sollenberger, N.R.3
  • 69
    • 66249100554 scopus 로고    scopus 로고
    • Robust transmit power control for cognitive radio
    • May
    • P. Setoodeh and S. Haykin, BRobust transmit power control for cognitive radio,[ Proc. IEEE, vol. 97, no. 5, pp. 915-939, May 2009.
    • (2009) Proc. IEEE , vol.97 , Issue.5 , pp. 915-939
    • Setoodeh, P.1    Haykin, S.2
  • 72
    • 78349242932 scopus 로고    scopus 로고
    • MSE-based linear transceiver optimization in MIMO cognitive radio networks with imperfect channel knowledge
    • Elba Island, Italy, Jun.
    • X. Gong, A. Ishaque, G. Dartmann, and G. Ascheid, BMSE-based linear transceiver optimization in MIMO cognitive radio networks with imperfect channel knowledge,[ in Proc. 2nd Int. Workshop Cogn. Inf. Process., Elba Island, Italy, Jun. 2010, pp. 105-110.
    • (2010) Proc. 2nd Int. Workshop Cogn. Inf. Process. , pp. 105-110
    • Gong, X.1    Ishaque, A.2    Dartmann, G.3    Ascheid, G.4
  • 73
  • 74
    • 84855980633 scopus 로고    scopus 로고
    • Joint transceiver beamforming in MIMO cognitive radio network via second-order cone programming
    • Feb
    • H. Du, T. Ratnarajah, M. Pesavento, and C. B. Papadias, BJoint transceiver beamforming in MIMO cognitive radio network via second-order cone programming,[ IEEE Trans. Signal Process., vol. 60, no. 2, pp. 781-792, Feb. 2012.
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.2 , pp. 781-792
    • Du, H.1    Ratnarajah, T.2    Pesavento, M.3    Papadias, C.B.4
  • 75
    • 80052158724 scopus 로고    scopus 로고
    • Distributed power control for cognitive radio networks, based on incumbent outage information
    • Kyoto, Japan, Jun DOI: 10.1109/icc.2011.5962937
    • O. Durowoju, K. Arshad, and K. Moessner, BDistributed power control for cognitive radio networks, based on incumbent outage information,[ in Proc. IEEE Int. Conf. Commun., Kyoto, Japan, Jun. 2011, DOI: 10.1109/icc.2011.5962937.
    • (2011) Proc. IEEE Int. Conf. Commun.
    • Durowoju, O.1    Arshad, K.2    Moessner, K.3
  • 76
    • 80052152643 scopus 로고    scopus 로고
    • Robust clustering of ad-hoc cognitive radio networks under opportunistic spectrum access
    • Kyoto, Japan, Jun DOI: 10.1109/icc.2011.5963426
    • D. Li and J. Gross, BRobust clustering of ad-hoc cognitive radio networks under opportunistic spectrum access,[ in Proc. IEEE Int. Conf. Commun., Kyoto, Japan, Jun. 2011, DOI: 10.1109/icc.2011.5963426.
    • (2011) Proc. IEEE Int. Conf. Commun.
    • Li, D.1    Gross, J.2
  • 77
    • 78651520951 scopus 로고    scopus 로고
    • Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systemsVPart II: Unknown channel statistics
    • Jan
    • H. Li and Z. Han, BDogfight in spectrum: Combating primary user emulation attacks in cognitive radio systemsVPart II: Unknown channel statistics,[ IEEE Trans. Wireless Commun., vol. 10, no. 1, pp. 274-283, Jan. 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.1 , pp. 274-283
    • Li, H.1    Han, Z.2
  • 78
    • 78449280420 scopus 로고    scopus 로고
    • Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks
    • Nov
    • H. Li and Z. Han, BCatch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks,[ IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3554-3565, Nov. 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.9 , Issue.11 , pp. 3554-3565
    • Li, H.1    Han, Z.2
  • 79
    • 78649438641 scopus 로고    scopus 로고
    • BJoint sidelobe and peak power reduction in OFDM-based cognitive radio
    • San Francisco, CA, Sep 5-8 DOI: 10.1109/VETECF.2010.5594133
    • A. Ghassemi, L. H.-J. Lampe, A. Attar, and T. A. Gulliver, BJoint sidelobe and peak power reduction in OFDM-based cognitive radio,[ in Proc. IEEE Veh. Technol. Conf. Fall, San Francisco, CA, Sep. 5-8, 2011, DOI: 10.1109/VETECF.2010.5594133.
    • (2011) Proc. IEEE Veh. Technol. Conf. Fall
    • Ghassemi, A.1    Lampe, L.H.-J.2    Attar, A.3    Gulliver T, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.