4.1   References

[1]  S. Haykin, "Cognitive Radio: Brain-Empowered Wireless Communications," IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201-220, February 2005.

 

[2]  Subramanian, A.P.; Gupta, H. “Fast Spectrum Allocation in Coordinated Dynamic Spectrum Access Based Cellular Networks”, New Frontiers in Dynamic Spectrum Access Networks, DySPAN, 2007, Page(s): 320 – 330, 2007.

 

[3]  Won-Yeol Lee; Akyildiz, I.F. “Optimal spectrum sensing framework for cognitive radio networks”, IEEE Transactions on Wireless Communications, Volume: 7, Issue: 10, Page(s): 3845 – 3857, 2008.

 

[4]  C. Cordeiro, K. Challapali, D. Birru, Sai Shankar, “IEEE 802.22: the first worldwide wireless standard based on cognitive radios”, IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN, Nov. 2005, pp. 328 - 337.

 

[5]  Sherman, M.; Mody, A.N.; Martinez, R.; Rodriguez, C.; Reddy, R., “IEEE Standards Supporting Cognitive Radio and Networks, Dynamic Spectrum Access, and Coexistence”, IEEE Communications Magazine, Volume: 46, Issue: 7, Page(s): 72 - 79, 2008.

 

[6]  Bo Gao; Yaling Yang; Park, J.-M.J., “A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks”, INFOCOM, 2014 Proceedings IEEE, Page(s): 2715 – 2723, 2014.

 

[7]  Attar, A.; Tang, H.; Vasilakos, A.V.; Yu, F.R.; Leung, V.C.M., “A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions”, Proceedings of the IEEE, Volume: 100, Issue: 12, Page(s): 3172 – 3186, 2012.

 

[8]  Baldini, G.; Sturman, T.; Biswas, A.R.; Leschhorn, R.; Godor, G.; Street, M., “Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead”, IEEE Communications Surveys & Tutorials, Volume 14, Issue: 2, Page(s): 355 – 379, 2012.

 

[9]  Husheng Li; Zhu Han, “Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics”, IEEE Transactions on Wireless Communications, Volume: 9, Issue: 11, Page(s): 3566 – 3577, 2010.

 

[10]       Anand, S.; Jin, Z.; Subbalakshmi, K.P., “An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks”, 3rd IEEE Symposium on New Frontiers in     Dynamic Spectrum Access Networks, 2008. DySPAN 2008. Page(s): 1 – 6, 2008.

 

[11]       Xiaofan He; Huaiyu Dai; Peng Ning, “A Byzantine attack defender: The Conditional Frequency Check”, IEEE International Symposium on Information Theory Proceedings (ISIT),     Page(s): 975 – 979, 2012.

 

[12]       Vempaty, A.; Agrawal, K.; Hao Chen; Varshney, P., “Adaptive learning of Byzantines' behavior in cooperative spectrum sensing”, IEEE Wireless Communications and     Networking Conference (WCNC), Page(s): 1310 - 1315, 2011.

 

[13]       Q. Ling, T. Li and Z. Ding, "A Novel Concept: Message Driven Frequency Hopping (MDFH)," in Communications, 2007. ICC '07. IEEE International Conference on, 2007.

 

[14]       G. Safdar and M. O'Neill, "Common Control Channel Security Framework for Cognitive Radio Networks," in Vehicular Technology Conference 2009, 2009.

 

[15]       NS-2, www.isu.edu

 

[16]       www.opnet.com

 

[17]       www.qualnet.com

 

[18]       https://www.nsnam.org/

 

[19]       http://cse.wustl.edu/Research/Lists/Technical%20Reports/Attachments/954/NS- 3%20Simulation%20of%20WiMAX%20Networks.pdf

 

[20]       http://www.nps.edu/Academics/Institutes/Cebrowski/Docs/RileyNPS-2010.pdf

 

[21]       C. Zou and C. Chigan, “On Game Theoretic DSA-Driven MAC for Cognitive Radio Networks,” Computer Comm., vol. 32, no. 18, pp. 1944-1954, 2009.

 

 

 

 

 

 

 

Return to: Main…