Journal articles on the topic 'Cognitive radio networks – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cognitive radio networks – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ganesh, D., and T. Pavan Kumar. "A Survey onadvances in security threats and its counter measures in cognitive radio networks." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 372. http://dx.doi.org/10.14419/ijet.v7i2.8.10465.
Full textRiza, Bob Subhan. "An Energy-Efficient Jamming Attacks Detection based on Cognitive Radio Networks." International Innovative Research Journal of Engineering and Technology 6, no. 2 (December 30, 2020): CS—37—CS—45. http://dx.doi.org/10.32595/iirjet.org/v6i2.2020.140.
Full textRath, Mamata. "Spectrum Access Issues and Security in Cognitive Radio Network." International Journal of Organizational and Collective Intelligence 9, no. 2 (April 2019): 31–44. http://dx.doi.org/10.4018/ijoci.2019040103.
Full textMohammed Abdul, Azeem, and Syed Umar. "Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 187. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp187-195.
Full textKhasawneh, Mahmoud, and Anjali Agarwal. "A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3261058.
Full textLiang Xiao, Shan Kang, and Lianfen Huang. "Sensor-Assisted Security in Cognitive Radio Networks." Journal of Convergence Information Technology 8, no. 6 (March 31, 2013): 31–39. http://dx.doi.org/10.4156/jcit.vol8.issue6.4.
Full textRen, Kui, Haojin Zhu, Zhu Han, and Radha Poovendran. "Security in cognitive radio networks [Guest Editorial]." IEEE Network 27, no. 3 (May 2013): 2–3. http://dx.doi.org/10.1109/mnet.2013.6523800.
Full textElkashlan, Maged, Lifeng Wang, Trung Q. Duong, George K. Karagiannidis, and Arumugam Nallanathan. "On the Security of Cognitive Radio Networks." IEEE Transactions on Vehicular Technology 64, no. 8 (August 2015): 3790–95. http://dx.doi.org/10.1109/tvt.2014.2358624.
Full textKim, Hyunsung. "Privacy Preserving Security Framework for Cognitive Radio Networks." IETE Technical Review 30, no. 2 (2013): 142. http://dx.doi.org/10.4103/0256-4602.110553.
Full textZhihui Shu, Yi Qian, and Song Ci. "On physical layer security for cognitive radio networks." IEEE Network 27, no. 3 (May 2013): 28–33. http://dx.doi.org/10.1109/mnet.2013.6523805.
Full textZhang, Hang, Tianyu Wang, Lingyang Song, and Zhu Han. "Interference Improves PHY Security for Cognitive Radio Networks." IEEE Transactions on Information Forensics and Security 11, no. 3 (March 2016): 609–20. http://dx.doi.org/10.1109/tifs.2015.2500184.
Full textRathee, Geetanjali, Naveen Jaglan, Sahil Garg, Bong Jun Choi, and Dushantha Nalin K. Jayakody. "Handoff Security Using Artificial Neural Networks in Cognitive Radio Networks." IEEE Internet of Things Magazine 3, no. 4 (December 2020): 20–28. http://dx.doi.org/10.1109/iotm.0001.2000011.
Full textLi, Jianwu, Zebing Feng, Zhiyong Feng, and Ping Zhang. "A survey of security issues in Cognitive Radio Networks." China Communications 12, no. 3 (March 2015): 132–50. http://dx.doi.org/10.1109/cc.2015.7084371.
Full textRomero, E., A. Mouradian, J. Blesa, J. M. Moya, and A. Araujo. "Simulation framework for security threats in cognitive radio networks." IET Communications 6, no. 8 (2012): 984. http://dx.doi.org/10.1049/iet-com.2010.0582.
Full textHaldorai, Anandakumar, and Arulmurugan Ramu. "Security and channel noise management in cognitive radio networks." Computers & Electrical Engineering 87 (October 2020): 106784. http://dx.doi.org/10.1016/j.compeleceng.2020.106784.
Full textSaher, Maria, Asjad Amin, Imran Ali Qureshi, Muhammad Ali Qureshi, and Muhammad Moazzam Jawaid. "Efficient Advanced Encryption Standard for Securing Cognitive Radio Networks." October 2018 37, no. 4 (October 1, 2018): 645–54. http://dx.doi.org/10.22581/muet1982.1804.16.
Full textPARVIN, SAZIA, FAROOKH KHADEER HUSSAIN, SONG HAN, and OMAR KHADEER HUSSAIN. "TRUST-BASED SPECTRUM SHARING FOR COGNITIVE RADIO NETWORKS." Journal of Interconnection Networks 12, no. 03 (September 2011): 155–71. http://dx.doi.org/10.1142/s0219265911002927.
Full textSun, Jiangfeng, Zhisong Bie, Hongxia Bie, Pengfei He, and Machao Jin. "Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels." Security and Communication Networks 2020 (September 22, 2020): 1–9. http://dx.doi.org/10.1155/2020/8842012.
Full textSultana, Rezwana, Md Zahurul Islam Sarkar, and Md Selim Hossain. "Enhancing Security in Cognitive Radio Multicast Networks Using Interference Power." Journal of Computer and Communications 07, no. 12 (2019): 66–78. http://dx.doi.org/10.4236/jcc.2019.712007.
Full textAbdalzaher, Mohamed S., Karim Seddik, and Osamu Muta. "Using Stackelberg game to enhance cognitive radio sensor networks security." IET Communications 11, no. 9 (June 22, 2017): 1503–11. http://dx.doi.org/10.1049/iet-com.2016.1336.
Full textZou, Yulong, Xianbin Wang, and Weiming Shen. "Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks." IEEE Transactions on Communications 61, no. 12 (December 2013): 5103–13. http://dx.doi.org/10.1109/tcomm.2013.111213.130235.
Full textSingal, T. L. "SPECTRUM SENSING AND SECURITY CONCERNS IN SOFTWARE-DEFINED RADIO AND COGNITIVE RADIO NETWORKS." International Journal of Engineering Applied Sciences and Technology 04, no. 12 (May 10, 2020): 409–14. http://dx.doi.org/10.33564/ijeast.2020.v04i12.070.
Full textYadav, Ramnaresh, Keshav Singh, and Ashwani Kumar. "Optimal Power Allocation for Achieving Secure Green Cognitive Radio Networks." Electronics 11, no. 13 (June 22, 2022): 1952. http://dx.doi.org/10.3390/electronics11131952.
Full textAlavi, Faezeh, and Hamid Saeedi. "Radio resource allocation to provide physical layer security in relay-assisted cognitive radio networks." IET Communications 9, no. 17 (November 26, 2015): 2124–30. http://dx.doi.org/10.1049/iet-com.2014.1099.
Full textChaturvedi, Srishti Priya, and T. L. Singal. "CHALLENGES FOR EVOLVING COUNTERMEASURES AGAINST SECURITY THREATS IN COGNITIVE RADIO NETWORKS." International Journal of Technical Research & Science Special, Issue3 (August 15, 2020): 92–99. http://dx.doi.org/10.30780/specialissue-icaccg2020/020.
Full textGao, Zhaoyu, Haojin Zhu, Shuai Li, Suguo Du, and Xu Li. "Security and privacy of collaborative spectrum sensing in cognitive radio networks." IEEE Wireless Communications 19, no. 6 (December 2012): 106–12. http://dx.doi.org/10.1109/mwc.2012.6393525.
Full textOliveira, Guilherme, Evelio Fernandez, Samuel Mafra, and Samuel Montejo-Sanchez. "Physical Layer Security in Cognitive Radio Networks Using Improper Gaussian Signaling." IEEE Communications Letters 22, no. 9 (September 2018): 1886–89. http://dx.doi.org/10.1109/lcomm.2018.2853629.
Full textLatsmi Manohar, Anita, Kok-Lim Alvin Yau, Mee Hong Ling, and Suleman Khan. "A Security-Enhanced Cluster Size Adjustment Scheme for Cognitive Radio Networks." IEEE Access 7 (2019): 117–30. http://dx.doi.org/10.1109/access.2018.2885070.
Full textLi, Bin, Xiaohui Qi, Kaizhi Huang, Zesong Fei, Fuhui Zhou, and Rose Qingyang Hu. "Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks." IEEE Transactions on Communications 67, no. 1 (January 2019): 83–96. http://dx.doi.org/10.1109/tcomm.2018.2873690.
Full textFakhrudeen, Ahmed M., and Omar Y. Alani. "Identification as a deterrent for security enhancement in cognitive radio networks." IET Networks 6, no. 6 (November 2017): 193–202. http://dx.doi.org/10.1049/iet-net.2017.0036.
Full textSafdar, G. A., M. O', and N. A. Neill. "A novel common control channel security framework for cognitive radio networks." International Journal of Autonomous and Adaptive Communications Systems 5, no. 2 (2012): 125. http://dx.doi.org/10.1504/ijaacs.2012.046281.
Full textLi, Mu, Hao Yin, Yuzhen Huang, Yan Wang, and Rui Yu. "Physical Layer Security in Overlay Cognitive Radio Networks With Energy Harvesting." IEEE Transactions on Vehicular Technology 67, no. 11 (November 2018): 11274–79. http://dx.doi.org/10.1109/tvt.2018.2868902.
Full textXu, Ding, and Qun Li. "Improving physical-layer security for primary users in cognitive radio networks." IET Communications 11, no. 15 (October 19, 2017): 2303–10. http://dx.doi.org/10.1049/iet-com.2017.0323.
Full textRiahi Manesh, Mohsen, and Naima Kaabouch. "Security threats and countermeasures of MAC layer in cognitive radio networks." Ad Hoc Networks 70 (March 2018): 85–102. http://dx.doi.org/10.1016/j.adhoc.2017.11.003.
Full textLing, Mee Hong, Kok-Lim Alvin Yau, Junaid Qadir, Geong Sen Poh, and Qiang Ni. "Application of reinforcement learning for security enhancement in cognitive radio networks." Applied Soft Computing 37 (December 2015): 809–29. http://dx.doi.org/10.1016/j.asoc.2015.09.017.
Full textHlavacek, Deanna, and J. Morris Chang. "A layered approach to cognitive radio network security: A survey." Computer Networks 75 (December 2014): 414–36. http://dx.doi.org/10.1016/j.comnet.2014.10.001.
Full textHoang, Thi-Anh, Chi-Bao Le, and Dinh-Thuan Do. "Security performance analysis for power domain NOMA employing in cognitive radio networks." Bulletin of Electrical Engineering and Informatics 9, no. 3 (June 1, 2020): 1046–54. http://dx.doi.org/10.11591/eei.v9i3.1639.
Full textRaza, Asif, Muhammad Tanveer Meeran, and Muizzud din. "Routine of Encryption in Cognitive Radio Network." July 2019 38, no. 3 (July 1, 2019): 609–18. http://dx.doi.org/10.22581/muet1982.1903.07.
Full textShakhov, Vladimir, and Insoo Koo. "An Efficient Clustering Protocol for Cognitive Radio Sensor Networks." Electronics 10, no. 1 (January 4, 2021): 84. http://dx.doi.org/10.3390/electronics10010084.
Full textV, Dr Bindhu. "Constraints Mitigation in Cognitive Radio Networks Using Cloud Computing." Journal of Trends in Computer Science and Smart Technology 2, no. 1 (March 5, 2020): 1–14. http://dx.doi.org/10.36548/jtcsst.2020.1.001.
Full textRajavel, S. Esakki, T. Aruna, and S. Allwin Devaraj. "Spectrum-aware shared protection (SASP) algorithm for cognitive radio networks." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 229. http://dx.doi.org/10.14419/ijet.v7i1.9.10002.
Full textHo-Van, Khuong, and Thiem Do-Dac. "Relay Selection for Security Improvement in Cognitive Radio Networks with Energy Harvesting." Wireless Communications and Mobile Computing 2021 (June 19, 2021): 1–16. http://dx.doi.org/10.1155/2021/9921782.
Full textHong, Liang, Wei Chen, Sachin Shetty, Dan Lo, and Reginald Cooper. "Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks." International Journal of Networking and Computing 7, no. 1 (2017): 50–68. http://dx.doi.org/10.15803/ijnc.7.1_50.
Full textXie, Ping, Moli Zhang, Gaoyuan Zhang, Ruijuan Zheng, Ling Xing, and Qingtao Wu. "On physical‐layer security for primary system in underlay cognitive radio networks." IET Networks 7, no. 2 (March 2018): 68–73. http://dx.doi.org/10.1049/iet-net.2017.0138.
Full textTang, H., F. R. Yu, M. Huang, and Z. Li. "Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks." IET Communications 6, no. 8 (2012): 974. http://dx.doi.org/10.1049/iet-com.2010.0553.
Full textSakran, H., O. Nasr, S. El-Rabaie, A. A. El-Azm, and M. Shokair. "Proposed relay selection scheme for physical layer security in cognitive radio networks." IET Communications 6, no. 16 (November 6, 2012): 2676–87. http://dx.doi.org/10.1049/iet-com.2011.0638.
Full textBouabdellah, Mounia, Faissal El Bouanani, Paschalis C. Sofotasios, Sami Muhaidat, Daniel Benevides Da Costa, Kahtan Mezher, Hussain Ben-Azza, and George K. Karagiannidis. "Cooperative Energy Harvesting Cognitive Radio Networks With Spectrum Sharing and Security Constraints." IEEE Access 7 (2019): 173329–43. http://dx.doi.org/10.1109/access.2019.2955205.
Full textShah, Hurmat Ali, and Insoo Koo. "A Novel Physical Layer Security Scheme in OFDM-Based Cognitive Radio Networks." IEEE Access 6 (2018): 29486–98. http://dx.doi.org/10.1109/access.2018.2842826.
Full textFragkiadakis, Alexandros G., Elias Z. Tragos, and Ioannis G. Askoxylakis. "A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks." IEEE Communications Surveys & Tutorials 15, no. 1 (2013): 428–45. http://dx.doi.org/10.1109/surv.2011.122211.00162.
Full textOliveira, Guilherme, Evelio Fernández, Samuel Mafra, Samuel Montejo-Sánchez, and César Azurdia-Meza. "Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks." Security and Communication Networks 2018 (December 25, 2018): 1–13. http://dx.doi.org/10.1155/2018/9065856.
Full text