Cognitive Networks 2007
DOI: 10.1002/9780470515143.ch11
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(17 citation statements)
references
References 32 publications
0
16
0
Order By: Relevance
“…Within a cooperative framework where secondary users exchange sensing information, false feedback from one or a group of malicious users could lead the CRN to take improper actions [23]. For example, the CRN could conclude that a given frequency band is occupied by a primary user when actually it is not the case or, the other way round, it could consider it as a vacant band when being used by a primary network.…”
Section: False Feedbackmentioning
confidence: 97%
See 1 more Smart Citation
“…Within a cooperative framework where secondary users exchange sensing information, false feedback from one or a group of malicious users could lead the CRN to take improper actions [23]. For example, the CRN could conclude that a given frequency band is occupied by a primary user when actually it is not the case or, the other way round, it could consider it as a vacant band when being used by a primary network.…”
Section: False Feedbackmentioning
confidence: 97%
“…As a consequence data must be secured by means of cryptographic primitives. [18] selfish [17] Jellyfish [19] OFA [20] selective forwarding [17] Lion [21] CCDA [22] false feedback [17,23] worm/sink -hole [17] • Modification of data: An attacker could try to modify the data exchanged between several entities to its own advantage. Thus, integrity of data must be assured.…”
Section: Attacks To Cognitive Radio Networkmentioning
confidence: 99%
“…Frank Fitzek (Aalborg University) and Marcos Katz (Samsung) notably bring together ideas for CWN CRA characterized by cooperation among intelligent entities [3]. Cooperation results from not just game theoretic considerations [60] but also from considerations of power optimization [61,62]; relays [63] and ad hoc discovery and routing [64]; diversity [65]; cross-layer optimization [66]; stability and security [67,68]; and spectrum efficiency considerations [53]. Distributed antennas [69,70], cooperative header compression [71] and coding [72], and distributed spatial channel control [73], among others, result from such a focus on cooperation in cognitive wireless networks.…”
Section: Networking and Cra Evolutionmentioning
confidence: 98%
“…Among these, the energy based detection is more popular and easier to implement. T International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015) Jan. [7][8]2015…”
Section: Introductionmentioning
confidence: 99%