Computer Science ›› 2014, Vol. 41 ›› Issue (5): 8-13.doi: 10.11896/j.issn.1002-137X.2014.05.002
Previous Articles Next Articles
FENG Guang-sheng,ZHENG Chen,WANG Hui-qiang,ZHAO Qian and LV Hong-wu
[1] 薛楠,周贤伟,周健.认知无线电网络诱骗攻击问题及安全解决方案[J].电信科学,2009,25(5):81-87 [2] 黑永强,李晓辉,李文涛.认知网络中的多用户MIMO线性协作频谱感知问题研究[J].通信学报,2012,33(3):45-52 [3] 刘全,高俊,郭云玮,等.抗SSDF攻击的一致性协作频谱感知方案[J].电子学报,2011,39(11):2643-2648 [4] 曾昆,彭启航,唐友喜.基于信任节点辅助的安全协同频谱感知策略[J].信号处理,2011,27(4):486-491 [5] 贺倩,冯志勇,张平.基于人工智能技术的认知无线网络重构决策算法[J].通信学报,2012,33(7):96-102 [6] Fragkiadakis A G,Tragos E Z,Askoxylakis I G.A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks[J].Communications Surveys & Tutorials,IEEE,2013,15(1):428-445 [7] Vien Q T,Stewart B G,Tianfield H,et al.Efficient cooperative spectrum sensing for three-hop cognitive wireless relay networks[J].Communications,IET,2013,7(2):199-127 [8] Zhang Xing,Xing Jia,Yan Z,et al.Outage performance study of cognitive relay networks with imperfect channel knowledge[J].IEEE Communications Letters,2013,17(1):27-30 [9] Kumar R N,Bapuji V,Govardhan A,et al.An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS)[J].Computer Engineering and Intelligent Systems,2012,3(7):62-70 [10] León O,Hernández-Serrano J,Soriano M.Securing cognitive radio networks[J].International Journal of Communication Systems,2010,23(5):633-652 [11] Reddy K G,Thilagam P S.Intrusion Detection technique forwormhole and following jellyfish and byzantine attacks in wireless mesh network[J].Advanced Computing,Networking and Security,2012,7135:631-637 [12] Wang B,Wu Y,Liu K R,et al.An anti-jamming stochastic game for cognitive radio networks[J].IEEE Journal on Selected Areas in Communications,2011,29(4):877-889 [13] Wu Y,Wang B,Liu K,et al.Anti-jamming games in multi-channel cognitive radio networks[J].IEEE Journal on Selected Areas in Communications,2012,30(1):4-15 (下转第19页)(上接第13页) [14] Asterjadhi A,Zorzi M.JENNA:a jamming evasive network-coding neighbor-discovery algorithm for cognitive radio networks [Dynamic Spectrum Management][J].Wireless Communications,IEEE,2010,17(4):24-32 [15] Zhang Lu,Pei Qing-qi,Li Hong-ning.Anti-jamming SchemeBased on Zero Pre-shared Secret in Cognitive Radio Network[C]∥Proceedings of Computational Intelligence and Security (CIS),2012Eighth International Conference on.Guangzhou,China,2012:670-673 [16] 聂晓文,卢显良,唐晖,等.基于洗牌策略的Sybil攻击防御[J].电子学报,2008(11):2144-2149 [17] 陈珊珊,杨庚,陈生寿.基于LEACH协议的Sybil攻击入侵检测机制[J].通信学报,2011,32(8):143-149 [18] Yu Bo,Xu Cheng-zhong,Xiao Bin.Detecting Sybil attacks inVANETs[J].Journal of Parallel and Distributed Computing,2013,73(6):746-756 [19] Kumar R N,Bapuji V,Govardhan A,et al.An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS)[J].Computer Engineering and Intelligent Systems,2012,3(7):62-70 [20] El Zoghby N,Cherfaoui V,Ducourthial B,et al.Distributed Data Fusion for Detecting Sybil Attacks in VANETs[M]∥Belief Functions:Theory and Applications.Springer Berlin Heidelberg,2012:351-358 [21] Chen Ze-sheng,Todor C,Chen Chao,et al.Modeling primary user emulation attacks and defenses in cognitive radio networks[C]∥Proceedings of 2009IEEE 28th International Performance Computing and Communications Conference (IPCCC).Scottsdale,AZ,2009:208-215 [22] Jin Z,Anand S,Subbalakshmi K.Detecting primary user emulation attacks in dynamic spectrum access networks[C]∥Procee-dings of 2009IEEE International Conference on Communications(ICC’09).Dresden,German,2009:1-5 [23] Jin Z,Anand S,Subbalakshmi K.Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing[J].ACM SIGMOBILE Mobile Computing and Communications Review,2009,13(2):74-85 [24] Liu Y,Ning P,Dai H.Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures[C]∥Proceedings of 2010IEEE Symposium on Security and Privacy (SP).Oakland,CA,USA,2010:286-301 [25] Wang Wen-kai,Li Hu-sheng,Sun Y L,et al.Attack-proof collaborative spectrum sensing in cognitive radio networks[C]∥Proceedings of the 43rd Annual Conference on Information Sciences and Systems(CISS 2009).Baltimore,MD,2009:130-134 [26] Zhu F,Seo S-W.Enhanced robust cooperative spectrum sensing in cognitive radio[J].Journal of Communications and Networks,2009,11(2):122-133 [27] Min A W,Shin K G,Hu Xin.Attack-tolerant distributed sensingfor dynamic spectrum access networks[C]∥Proceedings of 17th IEEE International Conference on Network Protocols(ICNP 2009).Princeton,NJ,2009:294-303 [28] Chen Rui-liang,Park Jung-min,Bian Kai-gui.Robust distributed spectrum sensing in cognitive radio networks[C]∥Proceedings of the 27th IEEE Conference on Computer Communications(INFOCOM 2008).Phoenix,AZ,2008:1876-1884 [29] Chen R,Park J-M J,Bian K.Robustness against byzantine fai-lures in distributed spectrum sensing[J].Computer Communications,2012,35(17):2115-2124 [30] Rawat A S,Anand P,Chen Hao,et al.Countering byzantine attacks in cognitive radio networks[C]∥Proceedings of 2010IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP).Dallas,TX,2010:3098-3101 [31] Nguyen-Thanh N,Koo I.An enhanced cooperative spectrumsensing scheme based on evidence theory and reliability source evaluation in cognitive radio context[J].Communications Letters,IEEE,2009,13(7):492-494 [32] Li Hu-sheng,Han Zhu.Catching attacker (s) for collaborative spectrum sensing in cognitive radio systems:An abnormality detection approach[C]∥Proceedings of 2010IEEE Symposium on New Frontiers in Dynamic Spectrum.Singapore,2010:1-12 [33] Tang H,Yu F R,Huang M,et al.Distributed consensus-basedsecurity mechanisms in cognitive radio mobile ad hoc networks[J].IET Communications,2012,6(8):974-983 [34] Zhang Yong-guang,Lee Wen-ke.Intrusion detection in wireless ad-hoc networks[C]∥Proceedings of the 6th annual international conference on Mobile computing and networking.ACM.New York,NY,USA,2000:275-283 [35] Pei Q,Li H,Ma J,et al.Defense against objective function attacks in cognitive radio networks[J].Chinese Journal of Electronics,2011,20(4):138-142 [36] Rathnayake U,Petander H,Ott M,et al.EMUNE:architecturefor mobile data transfer scheduling with network availability predictions[J].Mob.Netw.Appl.,2012,17(2):216-233 [37] Hernandez-Serrano J,León O,Soriano M.Modeling the lion at-tack in cognitive radio networks[J].EURASIP Journal on Wireless Communications and Networking,2011,2011:1-10 |
No related articles found! |
|