2013
DOI: 10.1109/mnet.2013.6523805
|View full text |Cite
|
Sign up to set email alerts
|

On physical layer security for cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 155 publications
(9 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…This can be implemented by letting S to share a j with L (e.g., the seed of the jamming signal generator at S is shared with L in a secure manner through a cooperation hand-shaking solely among S and L before information transmission starts). Such a jamming signal generation is widely accepted in most existing works (e.g., [34][35][36][37][38][39][40][41][42][43]). Accordingly, the legal receiver L can exactly re-generate the jamming signal and completely take it out of its received signal, intimately obtaining the jamming-free signal at L aŝ…”
Section: System Modelmentioning
confidence: 99%
“…This can be implemented by letting S to share a j with L (e.g., the seed of the jamming signal generator at S is shared with L in a secure manner through a cooperation hand-shaking solely among S and L before information transmission starts). Such a jamming signal generation is widely accepted in most existing works (e.g., [34][35][36][37][38][39][40][41][42][43]). Accordingly, the legal receiver L can exactly re-generate the jamming signal and completely take it out of its received signal, intimately obtaining the jamming-free signal at L aŝ…”
Section: System Modelmentioning
confidence: 99%
“…To ensure security, physical-layer security technology is an effective confidentially protection mechanism [18,19,20,21,22]. In Ref.…”
Section: Introductionmentioning
confidence: 99%
“…Ref. [22] emphasized that both the primary users (PUs) and secondary users (SUs) must be defended from eavesdropping in cognitive networks. Specifically, it is legitimate that the SUs are allowed to access the primary spectrum by cooperating with the PUs, where the SUs act as a relay or a friendly jammer to elevate the PU’s secrecy [24].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, securing the communication between legitimate SUs is a challenging issue due to the fact that numerous attacks can be launched against cognitive radio networks. Comprehensive studies on this aspect [3,4,5] show that two of the major physical layer attacks against cognitive radio networks are spectrum sensing data falsification (SSDF) and eavesdropping. SSDF is performed on a collaborative sensing setup [6]: an attacker sends false spectrum sensing data to other SUs, in case of distributed sensing decision, or to the fusion center [7], resulting in a wrong spectrum access decision.…”
Section: Introductionmentioning
confidence: 99%