期刊文献+

认知无线电网络安全研究 被引量:1

Investigation on Security in Cognitive Radio Networks
下载PDF
导出
摘要 分析了认知无线电网络中存在的两类安全隐患,归纳了针对这些安全隐患的网络攻击行为,介绍了目前安全领域的研究成果,并探讨了认知无线电网络安全技术未来的发展方向。 This paper mainly analyzes two classes of security vulnerabilities in Cognitive Radio Networks (CRN) and some possible attacks resulted by these vulnerabilities. In addition, some new research achievements and future direction of development in the domain of CRN security have been introduced.
出处 《现代传输》 2009年第3期73-77,共5页 Modern Transmission
关键词 认知无线电网络 网络安全 安全隐患 攻击行为 CRN network security security vulnerabilities attacks
  • 相关文献

参考文献14

  • 1Y. Xiao, X. Shen, D. Du, Wireless network security. Springer, 2007.
  • 2Qusay, Co.qn tive Networks: Towards Self- Aware Networks. Wiley, 2007, pp.271-292.
  • 3R. Chen, J. Park, et al. Toward secure distributed spectrum sensin.q in cognitive radio networks Communications Magazine, IEEE. 2008, 46(4): 50-55.
  • 4T. X. Brown, A. Sethi, Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment. Mobile Networks and Applications. 2008.
  • 5R. Chen, J. Park, J. H. Reed, Defense against Primary User Emulation Attacks in Co.qnitive Radio Networks. IEEE Journal on selected areas in Communications, 2008, 26(1): 25-37.
  • 6R. Chen, J. Park, Ensurinq Trustworthy Spectrum Sensinq in Co qnitive Radio Networks. Proc. IEEE Wksp: Networking Technologies for Software Defined Radio Networks, Sep, 2006, pp.110-119.
  • 7K. Bian, J. Park, MAC-Laver Misbehaviors in Multi-Hop Co qnitive Radio Networks.US - Korea Conference on Science, Technology, and Entrepreneurship (UKC2006), Au.q. 2006.
  • 8Y. Zhao, J. H. Reed, Radio Environment Map Desiqn and Exploitation. MPRG Technical Report, Virginia Tech, Blacksburg, VA. 2005,
  • 9J. Hillenbrand, T. A. Weiss, and F. K. Jondra Caculation of Detection and False Alarm Probabilities n Spectrum Poolinq Systems. IEEE Commun.Lett, vol.9 No,4, Apr, 2005, pp.349-351.
  • 10P. K. Varshney, Distributed Detection and Data Fusion. Sprin.qer.Verlag, 1997.

二级参考文献13

  • 1FCC, ET Docket No 03 - 222, Notice of proposed rule making and order[ S].
  • 2Akyildiz I F, Altunbasak Y, Fekri Y, et al. AdaptNet: adaptive protocol suite for next generation wireless internet[J]. IEEE Communications Magazine 2004,42 (3): 128 -138.
  • 3Maldonado D, Lie B, Hugine A, et al. Cognitive radio applications to dynamic spectrum allocation [ C ]// Proc. IEEE DySPAN 2005. IEEE, 2005 : 597 - 600.
  • 4Milstein L B. Interference rejection techniques in spread spectrum communications [ J ]. Proc. IEEE, 1988, (76) : 657 -671.
  • 5Chen R, Park J M. Ensuring trustworthy spectrum sensing in cognitive radio networks [ C]//IEEE Workshop on Networking Technologies for Software Defined Radio Networks (held in conjunction with IEEE SECON 2006). IEEE ,2006.
  • 6Sahai A,Hoven N ,Tandra R. Some fundamental limits in cognitive radio [ C ]//42nd Allerton Conf on Communication, Control, and Computing. Illinois, USA,2004.
  • 7Achilles D, Li D N. Narrow - band interference suppression in spread spectrum communication systems [ J ]. Signal Process, 1991, 24(1) : 61 -76.
  • 8Poor H V, Rusch L A. Narrowband interference suppression in spread spectrum CDMA [ J ]. IEEE Pers. Commun. , 1994, 3(8) : 14 -27.
  • 9朱近康.扩展频谱特性及其应用[M].合肥:中国科学技术大学出版社,1993.
  • 10Challapali K, Mangold S, Zhong Z. Spectrum agile radio : detecting spectrum opportunities[ C]//6th annual international symposium on advanced radio technologies. 2004.

共引文献6

同被引文献20

  • 1Chen R, Park J M. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks[C]. Proceedings of IEEE Workshop of Networking Technologies for Software Defined Radio Networks, Washington: IEEE Computer Society, 2006, 110-119.
  • 2Chen R, Park J M. Toward secure distributed spectrum sensing in cognitive radio networks[J]. IEEE Communications Magazine, 2008, 46 (4): 50-55.
  • 3Huahui Wang, Lightfoot L, Tongtong Li. On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks [C]. Proceedings of 2010 44th Annual Conference on Information Sciences and Systems (CISS), Washington: IEEE Computer Society, 2010, 1-6.
  • 4Noon, E, Hnsheng Li. Defending against Hit-and-Run Attackers in Collaborative Spectrum Sensing of Cognitive Radio Networks: A Point System[C]. Proceedings of 2010 IEEE 71st Vehicular Technology Conference (VTC 2010-Spring), Washington: IEEE Computer Society, 2010, 11-15.
  • 5Husheng Li, Zhu Han. Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks[J]. IEEE Transactions on Wireless .Communications, 2010, 9 (11): 3554-3565.
  • 6Zhu Q, Han Z, Basar T. No-Regret Learning in Collaborative Spectrum Sensing with Malicious Nodes[C]. Proceedings of 2010 IEEE International Conference on Communications (ICC), Washington: IEEE Computer Society, 2010, 1-6.
  • 7Fatemieh O, Chandra R, Gunter C A. Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks[C]. Proceedings of 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, Washington: IEEE Computer Society, 2010, 1-12.
  • 8Ankit Singh Rawat, Priyank Anand, Hao Chen, et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks[J]. IEEE Transactions on Signal Processing, 2011, 59 (2): 774-786.
  • 9Rawat A S, Anand P, Hao Chen, et al. Countering byzantine attacks in cognitive radio networks[C]. Proceedings of 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), Washington: IEEE Computer Society, 2010, 3098-3101.
  • 10Chen l:k, Park J M, Reed J H. Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications Special Issue on Cognitive Radio Theory and Applications, 2008, 26(l): 25-37.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部