2012
DOI: 10.1109/mwc.2012.6393525
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy of collaborative spectrum sensing in cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
40
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 91 publications
(40 citation statements)
references
References 6 publications
0
40
0
Order By: Relevance
“…This would make the task more challenging and difficult for a cognitive user. In addition, this can affect the performance due to reasons like lower efficiency, slower sharing of spectrum resources allocation, and less reliability than the cooperative technique [8,16,24,33]. The last classification is access technology, whether it is an overlay or underlay approach [22,24,26,34].…”
Section: ) Spectrum Mobility Vacates the Channel In Case The Pu Is Dmentioning
confidence: 99%
See 1 more Smart Citation
“…This would make the task more challenging and difficult for a cognitive user. In addition, this can affect the performance due to reasons like lower efficiency, slower sharing of spectrum resources allocation, and less reliability than the cooperative technique [8,16,24,33]. The last classification is access technology, whether it is an overlay or underlay approach [22,24,26,34].…”
Section: ) Spectrum Mobility Vacates the Channel In Case The Pu Is Dmentioning
confidence: 99%
“…This indicates that the cognitive ability and reconfiguration capability are the core elements that make CR an advanced technology, which grants dynamic access to the unused spectrum for both licensed and unlicensed users through certain characteristics: adoption, awareness, modification, capability of learning, observation, and communication in realistic environments [10][11][12][13][14][15][16]. These characteristics provide reliable communication among CR users anytime and anywhere as a smart and intelligent choice to operate dynamically through artificial intelligence algorithms, such as spectrum sensing, spectrum sharing, and spectrum mobility [13,17].…”
Section: Introductionmentioning
confidence: 99%
“…Thereby, user needs to take direct access to the sensor nodes to acquire data whenever he (or she) requires. Research into security and privacy focused on wireless sensor networks has been challenging issues to researchers [6][7][8][9][10][11][12][13][14][15]. Wireless sensor networks are subject to various attacks including eavesdropping, modification, interception, replay, tracking and identity exposure because of their open and dynamic nature.…”
Section: Introductionmentioning
confidence: 99%
“…CR nodes compete to sense available channels. [3].Providing security is a major issue that comes into picture in any network. In the case of CR networks, selfish attacks are a type of threat, in which the selfish secondary users (SSU) will occupy all or part of the channels and leave those channels underutilized.…”
Section: Introductionmentioning
confidence: 99%