[1] 吴慧欣, 王秉, 柴争义. 一种采用并行免疫优化的频谱分配算法[J]. 西安电子科技大学学报, 2014, 41(4): 111-115.
WU Huixin, WANG Bing, CHAI Zhengyi. Spectrum Allocation Algorithm Based on Parallel Immune Optimization[J]. Journal of Xidian University, 2014, 41(4): 111-115.
[2] XIN C S, SONG M. Detection of PUE Attacks in Cognitive Radio Networks Based on Signal Activity Pattern[J]. IEEE Transactions on Mobile Computing, 2014, 13(5): 1022-1034.
[3] GHAZNAVI M, JAMSHIDI A. A Reliable Spectrum Sensing Method in the Presence of Malicious Sensors in Distributed Cognitive Radio Network[J]. IEEE Sensors Journal, 2015, 15(3): 1810-1816.
[4] HYDER C S, GREBUR B, LI X, et al. ARC: Adaptive Reputation Based Clustering Against Spectrum Sensing Data Falsification Attacks[J]. IEEE Transactions on Mobile Computing, 2014, 13(8): 1022-1034.
[5] ZHANG L Y, WU Q H, DING G R, et al. Performance Analysis of Probabilistic Soft SSDF Attack in Cooperative Spectrum Sensing[J]. EURASIP Journal on Advances in Signal Processing, 2014, 2014(1): 3119-3126.
[6] HTIKE Z, LEE J, HONG C S. A MAC Protocol for Cognitive Radio Networks with Reliable Control Channels Assignment[C]//Proceedings of IEEE International Conference on Information Networking. Piscataway: IEEE, 2012: 81-85.
[7] LEON O, HERNANDEZ-SERRANO J, SORIANO M. A New Cross-layer Attack to TCP in Cognitive Radio Networks[C]//Proceedings of Second International Workshop on Cross Layer Design. Piscataway: IEEE, 2009: 1-5.
[8] NENE M, YADAV S. RSS Based Detection and Expulsion of Malicious Users from Cooperative Sensing in Cognitive Radios[C]//Proceedings of the 3rd IEEE International Advance Computing Conference. Washington: IEEE Computer Society, 2013: 181-184.
[9] REHMAN S U, SOWERBY K W, COGHILL C. Radio-frequency Fingerprinting for Mitigating Primary User Emulation Attack in Low-end Cognitive Radios[J]. IET Communications, 2014, 8(8): 1274-1284.
[10] ALAHMADI A, ABDELHAKIM M, REN J, et al. Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5): 772-781.
[11] ALTHUNIBAT S, SUCASAS V, MARQUES H, et al. On the Trade-off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio[J]. IEEE Communications Letters, 2013, 17(8): 1564-1567.
[12] BANSAL T, CHEN B, SINHA P. FastProbe: Malicious User Detection in Cognitive Radio Networks through Active Transmissions[C]//3rd IEEE Conference on Computer Communications. Piscataway: IEEE, 2014: 2517-2525.
[13] 王小毛, 黄传河, 吕怡龙, 等. 模拟人群信任和决策机制的协作频谱感知方法[J]. 通信学报, 2014, 35(3): 94-108.
WANG Xiaomao, HUANG Chuanhe, L Yilong, et al. Cooperative Spectrum Sensing Scheme Based on Crowd Trust and Decision-making Mechanism[J]. Journal on Communications, 2014, 35(3): 94-108.
[14] KANG X, LIANG Y C, NALLANATHAN A, et al. Optimal Power Allocation for Fading Channels in Cognitive Radio Networks: Ergodic Capacity and Outage Capacity[J]. IEEE Transactions on Wireless Communications, 2009, 8(2): 940-950. |