메뉴 건너뛰기




Volumn , Issue , 2013, Pages 796-803

A secure MAC protocol for Cognitive Radio Networks (SMCRN)

Author keywords

BAN Logic; Cognitive Radio Network; MAC Protocol; Security; Spectrum Sharing

Indexed keywords

BAN LOGIC; COGNITIVE RADIO NETWORK; MAC PROTOCOL; SECURITY; SPECTRUM SHARING;

EID: 84892499010     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (22)
  • 2
    • 78650886567 scopus 로고    scopus 로고
    • Cognitive radios for dynamic spectrum access: From concept to reality
    • K, Shin., H, Kim., A, Min., and A, Kumar. (2010) "Cognitive radios for dynamic spectrum access: from concept to reality", Wireless Communications, IEEE, vol. 17, no. 6. pp. 64-74.
    • (2010) Wireless Communications, IEEE , vol.17 , Issue.6 , pp. 64-74
    • Shin, K.1    Kim, H.2    Min, A.3    Kumar, A.4
  • 3
    • 84866740849 scopus 로고    scopus 로고
    • Impact of primary user emulation attacks on dynamic spectrum access networks
    • Z, Jin., S, Anand., and K, Subbalakshmi. (2012) "Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks", Communications, IEEE Transactions on, vol. 60, no. 9, pp. 2635-2643.
    • (2012) Communications, IEEE Transactions on , vol.60 , Issue.9 , pp. 2635-2643
    • Jin, Z.1    Anand, S.2    Subbalakshmi, K.3
  • 4
    • 84867826511 scopus 로고    scopus 로고
    • Defeating primary user emulation attacks using belief propagation in cognitive radio networks
    • Z, Yuan., D, Niyato., H, Li., J, Song., and Z, Han. (2012) "Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks", Selected Areas in Communications, IEEE Journal on, vol. 30, no, 10, pp. 1850-1860.
    • (2012) Selected Areas in Communications, IEEE Journal on , vol.30 , Issue.10 , pp. 1850-1860
    • Yuan, Z.1    Niyato, D.2    Li, H.3    Song, J.4    Han, Z.5
  • 8
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • R. Chen., J, Park,. and, J. Reed. (2008) "Defense against Primary User Emulation Attacks in Cognitive Radio Networks", Selected Areas in Communications, IEEE Journal on, vol. 26, no. 1, pp. 25-37
    • (2008) Selected Areas in Communications, IEEE Journal on , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J..2    Reed, J.3
  • 10
    • 84892501240 scopus 로고    scopus 로고
    • Identity-based authentication and access control in wireless sensor networks
    • March 2012
    • A, Al-Mahmud., and M, Morogan. (2012) "Identity-based Authentication and Access Control in Wireless Sensor Networks", International Journal of Computer Applications, vol 4, no. 13, March 2012.
    • (2012) International Journal of Computer Applications , vol.4 , Issue.13
    • Al-Mahmud, A.1    Morogan, M.2
  • 12
    • 79960556311 scopus 로고    scopus 로고
    • Generalized digital certificate for user authentication and key establishment for secure communications
    • July 2011
    • L, Harn., and R, Jian. (2011) "Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications", Wireless Communications, IEEE Transactions on, vol. 10, no. 7, pp. 2372-2379, July 2011
    • (2011) Wireless Communications, IEEE Transactions on , vol.10 , Issue.7 , pp. 2372-2379
    • Harn, L.1    Jian, R.2
  • 13


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.