[1] Mitola Ⅲ J , Maguire Jr G Q. Cognitive Radio: Making Software Radios More Personal [J]. IEEE Personal Communications, 1999, 6(4): 13-18.
[2] Baldini G, Sturman T, Biswas A R, et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead [J]. IEEE Communications Surveys & Tutorials, 2012, 14(2): 355-379.
[3] Burbank J L. Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security [C]//3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. Piscataway: IEEE, 2008: 1-7(4362536).
[4] Chaczko Z, Wickramasooriya R, Klempous R, et al. Security Threats in Cognitive Radio Applications [C]//14th International Conference on Intelligent Engineering Systems. Piscataway: IEEE, 2010: 209-214.
[5] Chen R, Park J M, Reed J H. Defense Against Primary User Emulation Attacks in Cognitive Radio Networks [J]. IEEE Journal on Selected Areas in Communications, 2008, 26(1): 25-37.
[6] Anand S, Jin Z, Subbalakshmi K P. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks [C]//3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks. Piscataway: IEEE, 2008: 76-81.
[7] Singhal D, Sharma M K, Garimella R M. Energy Efficient Localization of Primary Users for Avoiding Interference in Cognitive Networks [C]//IEEE International Conference on Computer Communication and Informatics. Piscataway: IEEE, 2012: 1-5(6158917).
[8] Akbari M, Falahati A. SSDF Protection in Cooperative Spectrum Sensing Employing a Computational Trust Evaluation Algorithm [C]//5th International Symposium on Telecommunications. Piscataway: IEEE, 2010: 23-28.
[9] Farmani F, Jannat-Abad M A, Berangi R. Detection of SSDF Attack Using SVDD Algorithm in Cognitive Radio Networks [C]//3rd International Conference on Computational Intelligence, Communication Systems and Networks. Piscataway: IEEE, 2011: 201-204.
[10] Pei Qingqi, Li Hongning, Ma Jianfeng, et al. Defense Against Objective Function Attacks in Cognitive Radio Networks [J]. Chinese Journal of Electronics, 2011, 20(4): 138-142.
[11] Li Shjuai, Zhu Haojin, Gao Zhaoyu, et al. Location Privacy Preservation in Collaborative Spectrum Sensing [C]//Proceedings of IEEE INFOCOM. Piscataway: IEEE, 2012: 729-737.
[12] Abdelhakim M, Zhang L, Ren J, et al. Cooperative Sensing in Cognitive Networks Under Malicious Attack [C]//IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway: IEEE, 2011: 3004-3007.
[13] Chen Chao, Cheng Hongbin, Yao Yudong. Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of The Primary User Emulation Attack [J]. IEEE Transactions on Wireless Communications, 2011, 10(7): 2135-2141.
[14] Kaligineedi P, Khabbazian M, Bhargava V K. Secure Cooperative Sensing Techniques for Cognitive Radio Systems [C]//IEEE International Conference on Communications. Piscataway: IEEE, 2008: 3406-3410.
[15] Sun X, Li C, Tsang D H K. Energy-Efficient Cooperative Sensing Scheduling for Heterogeneous Channel Access in Cognitive Radio [C]//IEEE Conference on Computer Communications Workshops. Piscataway: IEEE, 2012: 145-150.
[16] Tang H, Yu F R, Huang M, et al. Distributed Consensus-Based Security Mechanisms in Cognitive Radio Mobile Ad Hoc Networks [J]. IET Communications, 2012, 6(8): 974-983. |