메뉴 건너뛰기




Volumn 15, Issue 3, 2015, Pages 1810-1816

A reliable spectrum sensing method in the presence of malicious sensors in distributed cognitive radio network

Author keywords

attack; Cognitive radio; cooperative; malicious users; spectrum sensing

Indexed keywords

DECISION MAKING;

EID: 84921369162     PISSN: 1530437X     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSEN.2014.2366642     Document Type: Article
Times cited : (45)

References (24)
  • 1
    • 84884858215 scopus 로고    scopus 로고
    • Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: How to cooperate?
    • Nov.
    • G. Ding, J. Wang, Q. Wu, F. Song, and Y. Chen, "Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: How to cooperate?" IEEE Sensors J., vol. 13, no. 11, pp. 4247-4255, Nov. 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.11 , pp. 4247-4255
    • Ding, G.1    Wang, J.2    Wu, Q.3    Song, F.4    Chen, Y.5
  • 2
    • 79251602165 scopus 로고    scopus 로고
    • Energy-efficient distributed spectrum sensing for cognitive sensor networks
    • Mar.
    • S. Maleki, A. Pandharipande, and G. Leus, "Energy-efficient distributed spectrum sensing for cognitive sensor networks," IEEE Sensors J., vol. 11, no. 3, pp. 565-573, Mar. 2011.
    • (2011) IEEE Sensors J. , vol.11 , Issue.3 , pp. 565-573
    • Maleki, S.1    Pandharipande, A.2    Leus, G.3
  • 3
    • 79251616953 scopus 로고    scopus 로고
    • Correlation-based sensing for cognitive radio networks: Bounds and experimental assessment
    • Mar.
    • R. K. Sharma and J. W. Wallace, "Correlation-based sensing for cognitive radio networks: Bounds and experimental assessment," IEEE Sensors J., vol. 11, no. 3, pp. 657-666, Mar. 2011.
    • (2011) IEEE Sensors J. , vol.11 , Issue.3 , pp. 657-666
    • Sharma, R.K.1    Wallace, J.W.2
  • 4
    • 84884885926 scopus 로고    scopus 로고
    • Optimal truncated ordered sequential cooperative spectrum sensing in cognitive radio
    • Nov.
    • N. Nguyen-Thanh and I. Koo, "Optimal truncated ordered sequential cooperative spectrum sensing in cognitive radio," IEEE Sensors J., vol. 13, no. 11, pp. 4188-4195, Nov. 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.11 , pp. 4188-4195
    • Nguyen-Thanh, N.1    Koo, I.2
  • 6
    • 84897481748 scopus 로고    scopus 로고
    • Research on cooperative spectrum sensing algorithm based on data fusion
    • Aug.
    • X. Lu, Q. Wu, and L. Wu, "Research on cooperative spectrum sensing algorithm based on data fusion," in Proc. Int. Conf. Meas., Inf. Control (ICMIC), Aug. 2013, pp. 252-256.
    • (2013) Proc. Int. Conf. Meas., Inf. Control (ICMIC) , pp. 252-256
    • Lu, X.1    Wu, Q.2    Wu, L.3
  • 9
    • 40849126704 scopus 로고    scopus 로고
    • Optimal linear cooperation for spectrum sensing in cognitive radio networks
    • Feb.
    • Z. Quan, S. Cui, and A. H. Sayed, "Optimal linear cooperation for spectrum sensing in cognitive radio networks," IEEE J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 28-40, Feb. 2008.
    • (2008) IEEE J. Sel. Topics Signal Process. , vol.2 , Issue.1 , pp. 28-40
    • Quan, Z.1    Cui, S.2    Sayed, A.H.3
  • 11
    • 51249091375 scopus 로고    scopus 로고
    • Secure cooperative sensing techniques for cognitive radio systems
    • May
    • P. Kaligineedi, M. Khabbazian, and V. K. Bhargava, "Secure cooperative sensing techniques for cognitive radio systems," in Proc. IEEE ICC, May 2008, pp. 3406-3410.
    • (2008) Proc. IEEE ICC , pp. 3406-3410
    • Kaligineedi, P.1    Khabbazian, M.2    Bhargava, V.K.3
  • 14
    • 71949106409 scopus 로고    scopus 로고
    • Attack-tolerant distributed sensing for dynamic spectrum access networks
    • Oct.
    • A. W. Min, K. G. Shin, and X. Hu, "Attack-tolerant distributed sensing for dynamic spectrum access networks," in Proc. 17th IEEE Int. Conf. Netw. Protocols (ICNP), Oct. 2009, pp. 294-303.
    • (2009) Proc. 17th IEEE Int. Conf. Netw. Protocols (ICNP) , pp. 294-303
    • Min, A.W.1    Shin, K.G.2    Hu, X.3
  • 15
    • 84904462448 scopus 로고    scopus 로고
    • Performance analysis of probabilistic soft SSDF attack in cooperative spectrum sensing
    • L. Zhang, Q. Wu, G. Ding, S. Feng, and J. Wang, "Performance analysis of probabilistic soft SSDF attack in cooperative spectrum sensing," EURASIP J. Adv. Signal Process., vol. 2014, no. 1, p. 81, 2014.
    • (2014) EURASIP J. Adv. Signal Process. , vol.2014 , Issue.1 , pp. 81
    • Zhang, L.1    Wu, Q.2    Ding, G.3    Feng, S.4    Wang, J.5
  • 16
    • 84866738801 scopus 로고    scopus 로고
    • Neat: A neighbor assisted spectrum decision protocol for resilience against primary user emulation attacks
    • Hoboken, NJ, USA, Tech. Rep., Dec. 2010. [Online]. Available
    • Z. Jin, S. Anand, and K. P. Subbalakshmi, "Neat: A neighbor assisted spectrum decision protocol for resilience against primary user emulation attacks," Stevens Inst. Technol., Hoboken, NJ, USA, Tech. Rep., Dec. 2010. [Online]. Available: http://www.stevens.edu/suba
    • Stevens Inst. Technol.
    • Jin, Z.1    Anand, S.2    Subbalakshmi, K.P.3
  • 18
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan.
    • R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.-M.2    Reed, J.H.3
  • 20
    • 84869593082 scopus 로고    scopus 로고
    • Defense against spectrum sensing data falsification attacks in cognitive radio networks
    • Berlin, Germany: Springer-Verlag
    • C. S. Hyder, B. Grebur, and L. Xiao, "Defense against spectrum sensing data falsification attacks in cognitive radio networks," in Security and Privacy in Communication Networks. Berlin, Germany: Springer-Verlag, 2012, pp. 154-171.
    • (2012) Security and Privacy in Communication Networks , pp. 154-171
    • Hyder, C.S.1    Grebur, B.2    Xiao, L.3
  • 21
    • 77954909920 scopus 로고    scopus 로고
    • Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing
    • Z. Jin, S. Anand, and K. P. Subbalakshmi, "Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing," ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 13, no. 2, pp. 74-85, 2009.
    • (2009) ACM SIGMOBILE Mobile Comput. Commun. Rev. , vol.13 , Issue.2 , pp. 74-85
    • Jin, Z.1    Anand, S.2    Subbalakshmi, K.P.3
  • 22
  • 23
    • 0038648984 scopus 로고    scopus 로고
    • On the energy detection of unknown signals over fading channels
    • May
    • F. F. Digham, M.-S. Alouini, and M. K. Simon, "On the energy detection of unknown signals over fading channels," in Proc. IEEE ICC, May 2003, pp. 3575-3579.
    • (2003) Proc. IEEE ICC , pp. 3575-3579
    • Digham, F.F.1    Alouini, M.-S.2    Simon, M.K.3
  • 24
    • 84860761341 scopus 로고    scopus 로고
    • Cognitive radio network as wireless sensor network (II): Security consideration
    • Jul.
    • F. Lin et al., "Cognitive radio network as wireless sensor network (II): Security consideration," in Proc. IEEE Nat. Aerosp. Electron. Conf. (NAECON), Jul. 2011, pp. 324-328.
    • (2011) Proc. IEEE Nat. Aerosp. Electron. Conf. (NAECON) , pp. 324-328
    • Lin, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.