Academic literature on the topic 'Cognitive radio networks – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cognitive radio networks – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cognitive radio networks – Security measures"
Ganesh, D., and T. Pavan Kumar. "A Survey onadvances in security threats and its counter measures in cognitive radio networks." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 372. http://dx.doi.org/10.14419/ijet.v7i2.8.10465.
Full textRiza, Bob Subhan. "An Energy-Efficient Jamming Attacks Detection based on Cognitive Radio Networks." International Innovative Research Journal of Engineering and Technology 6, no. 2 (December 30, 2020): CS—37—CS—45. http://dx.doi.org/10.32595/iirjet.org/v6i2.2020.140.
Full textRath, Mamata. "Spectrum Access Issues and Security in Cognitive Radio Network." International Journal of Organizational and Collective Intelligence 9, no. 2 (April 2019): 31–44. http://dx.doi.org/10.4018/ijoci.2019040103.
Full textMohammed Abdul, Azeem, and Syed Umar. "Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 187. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp187-195.
Full textKhasawneh, Mahmoud, and Anjali Agarwal. "A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3261058.
Full textLiang Xiao, Shan Kang, and Lianfen Huang. "Sensor-Assisted Security in Cognitive Radio Networks." Journal of Convergence Information Technology 8, no. 6 (March 31, 2013): 31–39. http://dx.doi.org/10.4156/jcit.vol8.issue6.4.
Full textRen, Kui, Haojin Zhu, Zhu Han, and Radha Poovendran. "Security in cognitive radio networks [Guest Editorial]." IEEE Network 27, no. 3 (May 2013): 2–3. http://dx.doi.org/10.1109/mnet.2013.6523800.
Full textElkashlan, Maged, Lifeng Wang, Trung Q. Duong, George K. Karagiannidis, and Arumugam Nallanathan. "On the Security of Cognitive Radio Networks." IEEE Transactions on Vehicular Technology 64, no. 8 (August 2015): 3790–95. http://dx.doi.org/10.1109/tvt.2014.2358624.
Full textKim, Hyunsung. "Privacy Preserving Security Framework for Cognitive Radio Networks." IETE Technical Review 30, no. 2 (2013): 142. http://dx.doi.org/10.4103/0256-4602.110553.
Full textZhihui Shu, Yi Qian, and Song Ci. "On physical layer security for cognitive radio networks." IEEE Network 27, no. 3 (May 2013): 28–33. http://dx.doi.org/10.1109/mnet.2013.6523805.
Full textDissertations / Theses on the topic "Cognitive radio networks – Security measures"
León, Abarca Olga. "Contributions to the security of cognitive radio networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/131053.
Full textAl-Talabani, Ali Mohammed Noori Hasan. "Enhancing physical layer security in cognitive radio networks." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/enhancing-physical-layer-security-in-cognitive-radio-networks(d9036158-5310-4292-b93d-f542354269a7).html.
Full textYan, Qiben. "Security Enhanced Communications in Cognitive Networks." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/49704.
Full textPh. D.
Chen, Changlong. "Robust and Secure Spectrum Sensing in Cognitive Radio Networks." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1383316543.
Full textChen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.
Full textPh. D.
Sibomana, Louis. "Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security Constraints." Doctoral thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-11739.
Full textBouallegue, Seifeddine. "Mobility and Security Management in Femtocell Networks." Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066084/document.
Full textTelecommunications networks are subject to continuous improvement and enhancement processes. Every new iteration brings its set of challenges and limitations. In fact, the exponential growth in telecommunication devices, from base stations to user equipments lead to serious energy efficiency issues. Along with the privacy threats, especially for wireless networks as the channels used by operators can also be used by any eavesdropper. Spectrum usage optimization is also a challenge due to the fact that the available spectrum in wireless communications systems has been a very rare resource because of the increasing demand. Emerging networks, such as femtocells, suffer also from the previously mentioned challenges. The current thesis work focuses on proposing several solutions to the previously cited challenges: energy efficiency, spectrum sharing and security. The research work introduced in this thesis has focused on three main axes: First, find a way to minimize the energy consumption of femtocells in macro/femto-cellular BWA networks by decreasing the number of unwanted mobility events and introducing new power states for the femtocell device. Second, propose a solution that aims to reduce the expected transmission time within the dwell time of Secondary User (SU) in the coverage of a femtocell using an algorithm based on the minimum expected transmission time within the dwell time of the User Equipment (UE) in the coverage of the femtocell. Finally, introduce a new scheme that is based on best relay selection method that maximizes the secrecy rate and benefits from increasing the number of relays under QoS constraint at the destination
Chuku, Ejike E. "Security and Performance Engineering of Scalable Cognitive Radio Networks. Sensing, Performance and Security Modelling and Analysis of ’Optimal’ Trade-offs for Detection of Attacks and Congestion Control in Scalable Cognitive Radio Networks." Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/18448.
Full textJackson, David. "Exploiting Rogue Signals to Attack Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3072.
Full textLo, Brandon Fang-Hsuan. "Design and analysis of common control channels in cognitive radio ad hoc networks." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50323.
Full textBooks on the topic "Cognitive radio networks – Security measures"
Beibei, Wang, ed. Cognitive radio networking and security: A game-theoretic view. Cambridge: Cambridge University Press, 2010.
Find full textZhang, Ning, and Jon W. Mark. Security-aware Cooperation in Cognitive Radio Networks. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-0413-6.
Full textZhang, Yan. Security in RFID and sensor networks. Boca Raton: Auerbach Publications, 2009.
Find full textAdvanced security and privacy for RFID technologies. Hershey, PA: Information Science Reference, 2013.
Find full textLopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Hershey, PA: Information Science Reference, 2013.
Find full textInternational Conference on Anti-Counterfeiting, Security, and Identification (2nd 2008 Guiyang, China). Proceedings of the 2nd international conference on anti-counterfeiting, security, and identification: 2008 ASID. [Piscataway, N.J: IEEE], 2008.
Find full textInternational Conference on Anti-Counterfeiting, Security, and Identification (2nd 2008 Guiyang, China). Proceedings of the 2nd international conference on anti-counterfeiting, security, and identification: 2008 ASID. [Piscataway, N.J: IEEE], 2008.
Find full textIEEE International Workshop on Anti-Counterfeiting, Security, Identification (2007 Xiamen Shi, China). 2007 International Workshop on Anti-counterfeiting, Security, Identification: Xiamen, China, 16-18 April 2007. Piscataway, N.J: IEEE, 2007.
Find full textCamenisch, Jan. Open Research Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers. Berlin, Heidelberg: IFIP International Federation for Information Processing, 2011.
Find full textInternational, Conference on Anti-Counterfeiting Security and Identification (3rd 2009 Hong Kong China). Proceedings of the 3rd international conference on anti-counterfeiting, security, and identification in comunication: 2009 ASID : August 20-22, 2009, City University of Hong Kong, Hong Kong, China. [Piscataway, N.J: IEEE], 2009.
Find full textBook chapters on the topic "Cognitive radio networks – Security measures"
Zhang, Ning, and Jon W. Mark. "Cooperative Cognitive Radio Networking." In Security-aware Cooperation in Cognitive Radio Networks, 15–22. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_2.
Full textSafdar, Ghazanfar A. "Cognitive Radio Networks: Sensing, Access, Security." In LTE-Advanced and Next Generation Wireless Networks, 443–72. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781118410998.ch16.
Full textHe, Xiaoli, Hong Jiang, Yu Song, and He Xiao. "Optimal Resource Allocation for Underlay Cognitive Radio Networks." In Cloud Computing and Security, 358–71. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_31.
Full textMapunya, Sekgoari, and Mthulisi Velempini. "Investigating Spectrum Sensing Security Threats in Cognitive Radio Networks." In Ad Hoc Networks, 60–68. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74439-1_6.
Full textSengupta, Shamik, Santhanakrishnan Anand, and Rajarathnam Chandramouli. "Self-Coexistence and Security in Cognitive Radio Networks." In Convergence of Mobile and Stationary Next-Generation Networks, 385–405. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2010. http://dx.doi.org/10.1002/9780470630976.ch13.
Full textMurmu, Mahendra Kumar, and Awadhesh Kumar Singh. "Security Issues in Cognitive Radio Ad Hoc Networks." In Handbook of Computer Networks and Cyber Security, 247–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-22277-2_10.
Full textZhang, Ning, and Jon W. Mark. "Introduction." In Security-aware Cooperation in Cognitive Radio Networks, 1–13. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_1.
Full textZhang, Ning, and Jon W. Mark. "Trust-Aware Cooperative Networking." In Security-aware Cooperation in Cognitive Radio Networks, 23–42. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_3.
Full textZhang, Ning, and Jon W. Mark. "Cooperative Networking for Secure Communications." In Security-aware Cooperation in Cognitive Radio Networks, 43–68. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_4.
Full textZhang, Ning, and Jon W. Mark. "Concluding Remarks." In Security-aware Cooperation in Cognitive Radio Networks, 69–70. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4939-0413-6_5.
Full textConference papers on the topic "Cognitive radio networks – Security measures"
Akin, Sami. "Security in cognitive radio networks." In 2014 48th Annual Conference on Information Sciences and Systems (CISS). IEEE, 2014. http://dx.doi.org/10.1109/ciss.2014.6814188.
Full textBoubiche, Djallel Eddine. "Cognitive Radio Sensor Networks." In IPAC '15: International Conference on Intelligent Information Processing, Security and Advanced Communication. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2816839.2852765.
Full textZhang, Xueying, and Cheng Li. "The security in cognitive radio networks." In the 2009 International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1582379.1582447.
Full textZhang, Yuan, Gaochao Xu, and Xiaozhong Geng. "Security Threats in Cognitive Radio Networks." In 2008 10th IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2008. http://dx.doi.org/10.1109/hpcc.2008.21.
Full textParvin, Sazia, Song Han, Farookh Khadeer Hussain, and Md Abdullah Al Faruque. "Trust based security for cognitive radio networks." In the 12th International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1967486.1967605.
Full textTrubin, I. S. "Security Threats in Mobile Cognitive Radio Networks." In 2018 IEEE East-West Design & Test Symposium (EWDTS). IEEE, 2018. http://dx.doi.org/10.1109/ewdts.2018.8524808.
Full textSumathi, A. C., and R. Vidhyapriya. "Security in cognitive radio networks - a survey." In 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2012. http://dx.doi.org/10.1109/isda.2012.6416522.
Full textSlimeni, Feten, Bart Scheers, and Zied Chtourou. "Security threats in military cognitive radio networks." In 2015 International Conference on Military Communications and Information Systems (ICMCIS). IEEE, 2015. http://dx.doi.org/10.1109/icmcis.2015.7158714.
Full textSoysa, Madushanka, Pamela C. Cosman, and Laurence B. Milstein. "Video cognitive radio networks for tactical scenarios." In 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860536.
Full textZhu, Li, and Huaqing Mao. "Unified Layered Security Architecture for Cognitive Radio Networks." In 2011 Asia-Pacific Power and Energy Engineering Conference (APPEEC). IEEE, 2011. http://dx.doi.org/10.1109/appeec.2011.5748846.
Full text