메뉴 건너뛰기




Volumn 27, Issue 3, 2013, Pages 10-15

Jamming mitigation in cognitive radio networks

Author keywords

[No Author keywords available]

Indexed keywords

BAND-WIDTH UTILIZATION; COGNITIVE RADIO NETWORK; COGNITIVE RADIO NETWORKS (CRNS); ENABLING TECHNOLOGIES; JAMMING MITIGATION; JAMMING STRATEGIES; MESSAGE PROPAGATION; PROBABILISTIC PROTOCOLS;

EID: 84879104274     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/MNET.2013.6523802     Document Type: Review
Times cited : (63)

References (17)
  • 1
    • 33745648091 scopus 로고    scopus 로고
    • Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey
    • Sept
    • I. F. Akyildiz et al., "Next Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey," Comput. Net., vol. 50, no. 13, Sept. 2006, pp. 2127-59.
    • (2006) Comput. Net , vol.50 , Issue.13 , pp. 2127-2159
    • Akyildiz, I.F.1
  • 2
    • 84869508857 scopus 로고    scopus 로고
    • A survey of security challenges in cognitive radio networks: Solutions and future research directions
    • A. Attar et al., "A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions," Proc. IEEE, no. 99, 2012, pp. 1-15.
    • (2012) Proc. IEEE , Issue.99 , pp. 1-15
    • Attar, A.1
  • 3
    • 79953208302 scopus 로고    scopus 로고
    • Control channel establishment in cognitive radio networks using channel hopping
    • Apr
    • K. Bian, J.-M. Park, and R. Chen, "Control Channel Establishment in Cognitive Radio Networks Using Channel Hopping," IEEE JSAC, vol. 29, no. 4, Apr. 2011, pp. 689-703.
    • (2011) IEEE JSAC , vol.29 , Issue.4 , pp. 689-703
    • Bian, K.1    Park, J.-M.2    Chen, R.3
  • 5
    • 84872115312 scopus 로고    scopus 로고
    • COKE: Crypto-less over-the-air key establishment
    • Jan
    • R. Di Pietro and G. Oligeri, "COKE: Crypto-Less over-the-Air Key Establishment," IEEE Trans. Info. Forensics and Security, vol. 8, no. 1, Jan. 2013, pp. 163-73.
    • (2013) IEEE Trans. Info. Forensics and Security , vol.8 , Issue.1 , pp. 163-173
    • Di Pietro, R.1    Oligeri, G.2
  • 6
    • 84879120141 scopus 로고    scopus 로고
    • United we stand: Intrusion-resilience in mobile unattended WSNs
    • no. PrePrints
    • R. Di Pietro et al., "United We Stand: Intrusion-Resilience in Mobile Unattended WSNs," IEEE Trans. Mobile Computing, vol. 99, no. PrePrints, 2012.
    • (2012) IEEE Trans. Mobile Computing , vol.99
    • Di Pietro, R.1
  • 7
    • 79953224848 scopus 로고    scopus 로고
    • Spoofing or jamming: Performance analysis of a tactical cognitive radio adversary
    • Apr
    • Q. Peng, P. Cosman, and L. Milstein, "Spoofing or Jamming: Performance Analysis of A Tactical Cognitive Radio Adversary," IEEE JSAC, vol. 29, no. 4, Apr. 2011, pp. 903-11
    • (2011) IEEE JSAC , vol.29 , Issue.4 , pp. 903-911
    • Peng, Q.1    Cosman, P.2    Milstein, L.3
  • 8
    • 79953200186 scopus 로고    scopus 로고
    • An anti-jamming stochastic game for cognitive radio networks
    • Apr
    • B. Wang et al., "An Anti-Jamming Stochastic Game for Cognitive Radio Networks," IEEE JSAC, vol. 29, no. 4, Apr. 2011, pp. 877-89.
    • (2011) IEEE JSAC , vol.29 , Issue.4 , pp. 877-889
    • Wang, B.1
  • 9
    • 80051902256 scopus 로고    scopus 로고
    • Thwarting inside jamming attacks on wireless broadcast communications
    • S. Liu, L. Lazos, and M. Krunz, "Thwarting Inside Jamming Attacks on Wireless Broadcast Communications," WISEC, 2011, pp. 29-40.
    • (2011) WISEC , pp. 29-40
    • Liu, S.1    Lazos, L.2    Krunz, M.3
  • 10
    • 11244260535 scopus 로고    scopus 로고
    • Channel surfing and spatial retreats: Defenses against wireless denial of service
    • New York, NY, USA: ACM
    • W. Xu et al., "Channel Surfing and Spatial Retreats: Defenses Against Wireless Denial of Service," Proc. 3rd ACM Wksp. Wireless Security, ser. WiSe '04, New York, NY, USA: ACM, 2004, pp. 80-89.
    • (2004) Proc. 3rd ACM Wksp. Wireless Security, Ser. WiSe '04 , pp. 80-89
    • Xu, W.1
  • 11
    • 77955813118 scopus 로고    scopus 로고
    • Jenna: A jamming evasive network-coding neighbor-discovery algorithm for cognitive radio networks
    • Aug
    • A. Asterjadhi and M. Zorzi, "Jenna: A Jamming Evasive Network-Coding Neighbor-Discovery Algorithm for Cognitive Radio Networks," Wireless Commun., vol. 17, no. 4, Aug. 2010, pp. 24-32.
    • (2010) Wireless Commun , vol.17 , Issue.4 , pp. 24-32
    • Asterjadhi, A.1    Zorzi, M.2
  • 12
    • 78449306498 scopus 로고    scopus 로고
    • Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, Part I: Known channel statistics
    • Nov
    • H. Li and Z. Han, "Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics," Trans. Wireless. Commun., vol. 9, no. 11, Nov. 2010, pp. 3566-77.
    • (2010) Trans. Wireless. Commun , vol.9 , Issue.11 , pp. 3566-3577
    • Li, H.1    Han, Z.2
  • 13
    • 84855466075 scopus 로고    scopus 로고
    • Anti-jamming games in multi-channel cognitive radio networks
    • Y. Wu et al., "Anti-Jamming Games in Multi-Channel Cognitive Radio Networks," IEEE JSAC, vol. 30, no. 1, 2012, pp. 4-15.
    • (2012) IEEE JSAC , vol.30 , Issue.1 , pp. 4-15
    • Wu, Y.1
  • 14
    • 79960882539 scopus 로고    scopus 로고
    • Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
    • June
    • C. Popper, M. Strasser, and S. Capkun, "Anti-Jamming Broadcast Communication Using Uncoordinated Spread Spectrum Techniques," IEEE JSAC, vol. 28, no. 5, June 2010, pp. 703-15.
    • (2010) IEEE JSAC , vol.28 , Issue.5 , pp. 703-715
    • Popper, C.1    Strasser, M.2    Capkun, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.