Main Article Content
Abstract
Keywords
Article Details
Authors retain the copyright without restrictions for their published content in this journal. IJSRTM is a SHERPA ROMEO Journal.
Publishing License
This is an open-access article distributed under the terms of
References
- Jaydip Sen, “Security and Privacy Challenges in Cognitive Wireless Sensor Networksâ€, Book Chapter in Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, Natarajan Meghanathan and Y. B. Reddy (Eds.), IGI-Global, USA, July 2013. DOI: https://doi.org/10.4018/978-1-4666-4221-8.ch011
- Husheng Li and Zhu Han,“ Dogfight in Spectrum: Combating Primary User Emulation Attacks in CognitiveRadio Systems–Part II: Unknown Channel Statisticsâ€, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 1, January 2011. DOI: https://doi.org/10.1109/TWC.2010.112310.100630
- Sandip Dash, “Cognitive Wireless Sensor Network: Security and Privacy Challengesâ€, NIST thesis, 2013.
- Gyanendra Prasad Joshi, Seung Yeob Nam and Sung Won Kim, “Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trendsâ€, Sensors 2013, 13, 11196-11228, 2013. DOI: https://doi.org/10.3390/s130911196
- Swathi Chandrashekar and Loukas Lazos, “A Primary User Authentication System for Mobile Cognitive Radio Networksâ€, Applied Sciences in Biomedical and Communication Technologies (ISABEL), 2010 3rd International Symposium, IEEE, 2010. DOI: https://doi.org/10.1109/ISABEL.2010.5702859
- Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li, “Mitigating Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standardâ€, GLOBECOM2013- Signals Processing for Communications Symposium, IEEE, 2013. DOI: https://doi.org/10.1109/GLOCOM.2013.6831569
- Rong Yu, Yan Zhang, Yi Liu, Stein Gjessing, Mohsen Guizani, “Securing Cognitive Radio Networks against Primary User Emulation Attacksâ€, arXiv:1308.6216 cs.ET, 2013.
- Olga León, Juan Hernández-Serrano, Miguel Soriano, “Robust Detection of Primary User Emulation Attacks in IEEE 802.22 Networksâ€, CogART '11 Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management, ISBN: 978-1-4503-0912-7, Article No. 51, 2011. DOI: https://doi.org/10.1145/2093256.2093307
- T. Charles Clancy, Nathan Goergen, “Security in Cognitive Radio Networks: Threats and Mitigationâ€, Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference, 2008. DOI: https://doi.org/10.1109/CROWNCOM.2008.4562534
- Pu, Di, “Primary User Emulation Detection in Cognitive Radio Networksâ€, Diss. Worcester Polytechnic Institute, 2013.
- Natraj Jaganmohan, Sandeep A Rao, “Mitigation of Primary User Emulation Attack using Time of Emission Estimationâ€, Advanced Network Security, NCSU Presentation.
- A.C.SUMATHI, Dr.R.VIDHYAPRIYA, “Intense Explore Algorithm – A Proactive way to eliminate PUE attacks in Cognitive Radio Networksâ€, WSEAS Conference 2015, Advances in Information Science and Computer Engineering, ISBN: 978-1-61804-276-7,2015.
- Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, and Mostafa M. Fouda, “Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks,†IEEE Network Magazine, vol. 27, no. 3, pp. 51-56, May-June 2013. DOI: https://doi.org/10.1109/MNET.2013.6523809
References
Jaydip Sen, “Security and Privacy Challenges in Cognitive Wireless Sensor Networksâ€, Book Chapter in Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, Natarajan Meghanathan and Y. B. Reddy (Eds.), IGI-Global, USA, July 2013. DOI: https://doi.org/10.4018/978-1-4666-4221-8.ch011
Husheng Li and Zhu Han,“ Dogfight in Spectrum: Combating Primary User Emulation Attacks in CognitiveRadio Systems–Part II: Unknown Channel Statisticsâ€, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 1, January 2011. DOI: https://doi.org/10.1109/TWC.2010.112310.100630
Sandip Dash, “Cognitive Wireless Sensor Network: Security and Privacy Challengesâ€, NIST thesis, 2013.
Gyanendra Prasad Joshi, Seung Yeob Nam and Sung Won Kim, “Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trendsâ€, Sensors 2013, 13, 11196-11228, 2013. DOI: https://doi.org/10.3390/s130911196
Swathi Chandrashekar and Loukas Lazos, “A Primary User Authentication System for Mobile Cognitive Radio Networksâ€, Applied Sciences in Biomedical and Communication Technologies (ISABEL), 2010 3rd International Symposium, IEEE, 2010. DOI: https://doi.org/10.1109/ISABEL.2010.5702859
Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li, “Mitigating Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standardâ€, GLOBECOM2013- Signals Processing for Communications Symposium, IEEE, 2013. DOI: https://doi.org/10.1109/GLOCOM.2013.6831569
Rong Yu, Yan Zhang, Yi Liu, Stein Gjessing, Mohsen Guizani, “Securing Cognitive Radio Networks against Primary User Emulation Attacksâ€, arXiv:1308.6216 cs.ET, 2013.
Olga León, Juan Hernández-Serrano, Miguel Soriano, “Robust Detection of Primary User Emulation Attacks in IEEE 802.22 Networksâ€, CogART '11 Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management, ISBN: 978-1-4503-0912-7, Article No. 51, 2011. DOI: https://doi.org/10.1145/2093256.2093307
T. Charles Clancy, Nathan Goergen, “Security in Cognitive Radio Networks: Threats and Mitigationâ€, Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference, 2008. DOI: https://doi.org/10.1109/CROWNCOM.2008.4562534
Pu, Di, “Primary User Emulation Detection in Cognitive Radio Networksâ€, Diss. Worcester Polytechnic Institute, 2013.
Natraj Jaganmohan, Sandeep A Rao, “Mitigation of Primary User Emulation Attack using Time of Emission Estimationâ€, Advanced Network Security, NCSU Presentation.
A.C.SUMATHI, Dr.R.VIDHYAPRIYA, “Intense Explore Algorithm – A Proactive way to eliminate PUE attacks in Cognitive Radio Networksâ€, WSEAS Conference 2015, Advances in Information Science and Computer Engineering, ISBN: 978-1-61804-276-7,2015.
Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, and Mostafa M. Fouda, “Intrusion Detection System (IDS) for Combating Attacks Against Cognitive Radio Networks,†IEEE Network Magazine, vol. 27, no. 3, pp. 51-56, May-June 2013. DOI: https://doi.org/10.1109/MNET.2013.6523809