2009
DOI: 10.1002/wcm.878
|View full text |Cite
|
Sign up to set email alerts
|

Constructing secured cognitive wireless networks: experiences and challenges

Abstract: Recent development in wireless communications has lead to the problem of growing spectrum shortage. Cognitive radio, as a novel technology, has been proposed in recent years to solve this problem by dynamically accessing the spectrum so as to enhance the spectrum utilization. Security in cognitive radio networks has become a challenging issue because there are more chances open to attackers by cognitive radio technology, compared to those from conventional wireless networks. These weaknesses and vulnerable asp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 54 publications
0
7
0
Order By: Relevance
“…Also the average packet rate is monitored. If the packet rate is higher and last for long period, then there is a possibility of some unusual activity (Zhang and Li, 2010).…”
Section: Link Layermentioning
confidence: 99%
See 1 more Smart Citation
“…Also the average packet rate is monitored. If the packet rate is higher and last for long period, then there is a possibility of some unusual activity (Zhang and Li, 2010).…”
Section: Link Layermentioning
confidence: 99%
“…If the retransmissions are occurring very frequently or the round trip time is longer than the average value, then we can say that there is some unusual activity in the network. An intrusion detection scheme based on RSS and RTT detection can be used to detect attacks at this layer (Zhang and Li, 2010).…”
Section: Transport Layermentioning
confidence: 99%
“…In a distributed spectrum sensing process, the attacker sends the wrong message spectrum sensing data collection center, which leads to bad decision making, data collection center, shown in Figure 1 [11] FIG. This is the most common perception of tampering with data.…”
Section: Spectrum Sensing Data Tampering Attacksmentioning
confidence: 99%
“…In the process of distributed Spectrum Sensing, the attacker sends the wrong Spectrum Sensing information to data collection center, which caused make the wrong decision by data collection center, shown in Figure 1 [11]. This is the most common perception tamper with the data.…”
Section: Data Tamper Attack Of Spectrum Sensingmentioning
confidence: 99%