Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …
society, and wireless services become increasingly important as the applications of wireless …
Wireless network virtualization: A survey, some research issues and challenges
Since wireless network virtualization enables abstraction and sharing of infrastructure and
radio spectrum resources, the overall expenses of wireless network deployment and …
radio spectrum resources, the overall expenses of wireless network deployment and …
Joint computation offloading and interference management in wireless cellular networks with mobile edge computing
Mobile edge computing (MEC) has attracted great interests as a promising approach to
augment computational capabilities of mobile devices. An important issue in the MEC …
augment computational capabilities of mobile devices. An important issue in the MEC …
Cooperative spectrum sensing in cognitive radio networks: A survey
Spectrum sensing is a key function of cognitive radio to prevent the harmful interference with
licensed users and identify the available spectrum for improving the spectrum's utilization …
licensed users and identify the available spectrum for improving the spectrum's utilization …
Energy-efficient resource allocation for heterogeneous cognitive radio networks with femtocells
Both cognitive radio and femtocell have been considered as promising techniques in
wireless networks. However, most of previous works are focused on spectrum sharing and …
wireless networks. However, most of previous works are focused on spectrum sharing and …
Byzantine attack and defense in cognitive radio networks: A survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …
A survey of security challenges in cognitive radio networks: Solutions and future research directions
In this survey, we present a comprehensive list of major known security threats within a
cognitive radio network (CRN) framework. We classify attack techniques based on the type …
cognitive radio network (CRN) framework. We classify attack techniques based on the type …
Interference alignment and its applications: A survey, research issues, and challenges
The capacity of interference network is a fundamental issue that eludes the researchers for
decades. Interference alignment (IA) is an emerging interference management technique …
decades. Interference alignment (IA) is an emerging interference management technique …
Privacy-aware offloading in mobile-edge computing
Recently, mobile-edge computing (MEC) emerges as a promising paradigm to enable
computation intensive and delay-sensitive applications at resource limited mobile devices …
computation intensive and delay-sensitive applications at resource limited mobile devices …
Dynamic resource allocation for heterogeneous services in cognitive radio networks with imperfect channel sensing
Resources in cognitive radio networks (CRNs) should dynamically be allocated according to
the sensed radio environment. Although some work has been done for dynamic resource …
the sensed radio environment. Although some work has been done for dynamic resource …