A SURVEY OF IMPLEMENTATION OF OPPORTUNISTIC SPECTRUM ACCESS ATTACK WITH ITS PREVENTIVE SENSING PROTOCOLS IN COGNITIVE RADIO NETWORKS
Jaydip Sen, “Security and Privacy Challenges in Cognitive Wireless Sensor Networks”, Book Chapter in Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, Natarajan Meghanathan and Y. B. Reddy (Eds.), IGI-Global, USA, July 2013.
Husheng Li and Zhu Han,“ Dogfight in Spectrum: Combating Primary User Emulation Attacks in CognitiveRadio Systems–Part II: Unknown Channel Statistics”, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 1, January 2011.
Sandip Dash, “Cognitive Wireless Sensor Network: Security and Privacy Challenges”, NIST thesis, 2013.
Gyanendra Prasad Joshi, Seung Yeob Nam and Sung Won Kim, “Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends”, Sensors 2013, 13, 11196-11228, 2013.
Swathi Chandrashekar and Loukas Lazos, “A Primary User Authentication System for Mobile Cognitive Radio Networks”, Applied Sciences in Biomedical and Communication Technologies (ISABEL), 2010 3rd International Symposium, IEEE, 2010.
Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li, “Mitigating Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard”, GLOBECOM2013- Signals Processing for Communications Symposium, IEEE, 2013.
Rong Yu, Yan Zhang, Yi Liu, Stein Gjessing, Mohsen Guizani, “Securing Cognitive Radio Networks against Primary User Emulation Attacks”, arXiv:1308.6216 cs.ET, 2013.
Olga León, Juan Hernández-Serrano, Miguel Soriano, “Robust Detection of Primary User Emulation Attacks in IEEE 802.22 Networks”, CogART '11 Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management, ISBN: 978-1-4503-0912-7, Article No. 51, 2011.
T. Charles Clancy, Nathan Goergen, “Security in Cognitive Radio Networks: Threats and Mitigation”, Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference, 2008.
Pu, Di, “Primary User Emulation Detection in Cognitive Radio Networks”, Diss. Worcester Polytechnic Institute, 2013.
Natraj Jaganmohan, Sandeep A Rao, “Mitigation of Primary User Emulation Attack using Time of Emission Estimation”, Advanced Network Security, NCSU Presentation.
A.C.SUMATHI, Dr.R.VIDHYAPRIYA, “Intense Explore Algorithm – A Proactive way to eliminate PUE attacks in Cognitive Radio Networks”, WSEAS Conference 2015, Advances in Information Science and Computer Engineering, ISBN: 978-1-61804-276-7,2015.
Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, and Mostafa M. Fouda, “Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks,” IEEE Network Magazine, vol. 27, no. 3, pp. 51-56, May-June 2013.
Copyright (c) 2015 Monisha Ravi, Nisha Ravi, N. Ravi
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.