期刊文献+

认知无线电网络安全综述 被引量:23

Security in cognitive radio networks
下载PDF
导出
摘要 认知无线电网络通过认知用户对无线环境的感知,获得频谱空洞信息,在不干扰主用户的前提下,伺机接入空闲频谱,从而满足更多用户的频谱需求,提高频谱资源的利用率,然而,也带来了前所未有的安全挑战。依托认知环,从数据信道、控制信道和终端设备三方面介绍其安全性所面临的问题,以及现有的解决方案,最后给出认知无线电网络的安全建议。 Cognitive radio can obtain and access spectrum white holes without interfering primary users by sensing wire-less environment to meet with the more spectrum requirement of users and improve spectrum utilization. However, it also brings new secure challenges that different from traditional wireless networks. Relying cognition cycle, the security is- sues in cognitive radio networks are presented from data channel, control channel and terminal equipment, then the ex-isting defensive measures and propose the secure recommendations of cognitive radio networks are introduced.
出处 《通信学报》 EI CSCD 北大核心 2013年第1期144-158,共15页 Journal on Communications
基金 国家自然科学基金资助项目(61172068 61003300) 新世纪优秀人才支持计划基金资助项目(NCET-11-0691) 中央高校基本科研业务费专项基金资助项目(K50511010003)~~
关键词 认知环 控制信道 数据信道 融合中心 cognition cycle control channel data channel fusion center
  • 相关文献

参考文献1

共引文献6

同被引文献152

  • 1邱慧敏.Sybil攻击原理和防御措施[J].计算机安全,2005(10):63-65. 被引量:6
  • 2S. Parvinetal. Cognitive radio network security: A survey[J]. Journal of Network and Computer Applications,2012,35(2): 1691 - 1708.
  • 3HERNANDEZ-SERRANO J, LEON O, SORIANO M. Modeling the lion attack in cognitive radio networks[J]. Journal on Wireless Communications and Networking, 2011, 20(11 ): 1-10.
  • 4ZENG K, PAWECZAK P, CABRC D. Reputation-based cooperative spectrum sensing with trusted nodes assistance[J]. Communications Letters, 2010, 32(14): 226-228.
  • 5CHEN S, ZENG K, MOHAPATRA P. Hearing is believing Detecting mobile primary user emulation attack in white space[A] INFOCOM, 2011 Proceedings IEEE[C]. 2011. 36-40.
  • 6SUN X X, CHEN L, TSANG D H K. Energy-efficient cooperative sensing scheduling fop heterogeneous channel access in cognitive radio[A]. Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on[C]. 2012. 145-150.
  • 7Wang], Yao S L,Chu D W ,et al. Connectivity of spectrum holes and latency of waiting for a spectrum hole in cognitive radio networks[J]. International Review on Computers and Software, 2012,7 C 5) ,2650 - 2654.
  • 8Choi K W,]eon W S,]eong,D G. Adaptive and distributed access to spectrum holes in cognitive radio system[J]. Wireless Personal Communications, 2013, 70C 1),207 - 226.
  • 9Yao Y D, Zheng BY, Zou Y L. Cooperative relay techniques for cognitive radio systems: spectrum sensing and secondary user transmissions[J]. IEEE Communications Magazine, 2012, 50 (4) ,98 -103.
  • 10Song M, Xin C S, Zhao Y X, et al. Dynamic spectrum access, From cognitive radio to network radio[J]. IEEE Wireless Communications ,2012,19(1) ,23 - 29.

引证文献23

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部