4.1 References
[1] S. Haykin,
"Cognitive Radio: Brain-Empowered Wireless Communications," IEEE
Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201-220,
February 2005.
[2] Subramanian, A.P.;
Gupta, H. “Fast Spectrum Allocation in Coordinated Dynamic Spectrum Access
Based Cellular Networks”, New Frontiers in Dynamic Spectrum Access Networks, DySPAN,
2007, Page(s): 320 – 330, 2007.
[3] Won-Yeol Lee;
Akyildiz, I.F. “Optimal spectrum sensing framework for cognitive radio networks”,
IEEE Transactions on Wireless Communications, Volume: 7, Issue: 10, Page(s):
3845 – 3857, 2008.
[4] C. Cordeiro, K.
Challapali, D. Birru, Sai Shankar, “IEEE 802.22: the first worldwide wireless
standard based on cognitive radios”, IEEE International Symposium on Dynamic
Spectrum Access Networks, DySPAN, Nov. 2005, pp. 328 - 337.
[5] Sherman, M.; Mody,
A.N.; Martinez, R.; Rodriguez, C.; Reddy, R., “IEEE Standards Supporting
Cognitive Radio and Networks, Dynamic Spectrum Access, and Coexistence”, IEEE Communications
Magazine, Volume: 46, Issue: 7, Page(s): 72 - 79, 2008.
[6] Bo Gao; Yaling Yang;
Park, J.-M.J., “A credit-token-based spectrum etiquette framework for
coexistence of heterogeneous cognitive radio networks”, INFOCOM, 2014
Proceedings IEEE, Page(s): 2715 – 2723, 2014.
[7] Attar, A.; Tang, H.;
Vasilakos, A.V.; Yu, F.R.; Leung, V.C.M., “A Survey of Security Challenges in
Cognitive Radio Networks: Solutions and Future Research Directions”, Proceedings
of the IEEE, Volume: 100, Issue: 12, Page(s): 3172 – 3186, 2012.
[8] Baldini, G.; Sturman,
T.; Biswas, A.R.; Leschhorn, R.; Godor, G.; Street, M., “Security Aspects in
Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead”,
IEEE Communications Surveys & Tutorials, Volume 14, Issue: 2, Page(s): 355 –
379, 2012.
[9] Husheng Li; Zhu Han, “Dogfight
in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio
Systems, Part I: Known Channel Statistics”, IEEE Transactions on Wireless
Communications, Volume: 9, Issue: 11, Page(s): 3566 – 3577, 2010.
[10] Anand, S.; Jin, Z.;
Subbalakshmi, K.P., “An Analytical Model for Primary User Emulation Attacks in
Cognitive Radio Networks”, 3rd IEEE Symposium on New Frontiers in Dynamic
Spectrum Access Networks, 2008. DySPAN 2008. Page(s): 1 – 6, 2008.
[11] Xiaofan He; Huaiyu
Dai; Peng Ning, “A Byzantine attack defender: The Conditional Frequency Check”,
IEEE International Symposium on Information Theory Proceedings (ISIT), Page(s):
975 – 979, 2012.
[12] Vempaty, A.; Agrawal,
K.; Hao Chen; Varshney, P., “Adaptive learning of Byzantines' behavior in
cooperative spectrum sensing”, IEEE Wireless Communications and Networking
Conference (WCNC), Page(s): 1310 - 1315, 2011.
[13] Q. Ling, T. Li and Z.
Ding, "A Novel Concept: Message Driven Frequency Hopping (MDFH)," in
Communications, 2007. ICC '07. IEEE International Conference on, 2007.
[14] G. Safdar and M.
O'Neill, "Common Control Channel Security Framework for Cognitive Radio
Networks," in Vehicular Technology Conference 2009, 2009.
[15] NS-2, www.isu.edu
[16] www.opnet.com
[17] www.qualnet.com
[20] http://www.nps.edu/Academics/Institutes/Cebrowski/Docs/RileyNPS-2010.pdf
[21] C. Zou and C. Chigan,
“On Game Theoretic DSA-Driven MAC for Cognitive Radio Networks,” Computer
Comm., vol. 32, no. 18, pp. 1944-1954, 2009.
Return to: Main…