Byzantine attack and defense in cognitive radio networks: A survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …
Advances on security threats and countermeasures for cognitive radio networks: A survey
RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …
with the capability to adapt their operating parameters on the fly based on the radio …
A survey of security challenges in cognitive radio networks: Solutions and future research directions
In this survey, we present a comprehensive list of major known security threats within a
cognitive radio network (CRN) framework. We classify attack techniques based on the type …
cognitive radio network (CRN) framework. We classify attack techniques based on the type …
Cellular-base-station-assisted device-to-device communications in TV white space
This paper presents a systematic approach to exploiting TV white space (TVWS) for device-
to-device (D2D) communications with the aid of the existing cellular infrastructure. The goal …
to-device (D2D) communications with the aid of the existing cellular infrastructure. The goal …
Kernel-based learning for statistical signal processing in cognitive radio networks: Theoretical foundations, example applications, and future directions
Kernel-based learning (KBL) methods have recently become prevalent in many engineering
applications, notably in signal processing and communications. The increased interest is …
applications, notably in signal processing and communications. The increased interest is …
Robust spectrum sensing with crowd sensors
This paper investigates the issue of cooperative spectrum sensing with a crowd of low-end
personal spectrum sensors (such as smartphones, tablets, and in-vehicle sensors), where …
personal spectrum sensors (such as smartphones, tablets, and in-vehicle sensors), where …
Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …
Location privacy preservation in collaborative spectrum sensing
Collaborative spectrum sensing has been regarded as a promising approach to enable
secondary users to detect primary users by exploiting spatial diversity. In this paper, we …
secondary users to detect primary users by exploiting spatial diversity. In this paper, we …
Attack prevention for collaborative spectrum sensing in cognitive radio networks
Collaborative spectrum sensing is vulnerable to data falsification attacks, where malicious
secondary users (attackers) submit manipulated sensing reports to mislead the fusion …
secondary users (attackers) submit manipulated sensing reports to mislead the fusion …
Cooperative spectrum sensing with M-ary quantized data in cognitive radio networks under SSDF attacks
In this paper, we address the challenging and important cooperative spectrum sensing
(CSS) problem with M-ary quantized data under spectrum sensing data falsification (SSDF) …
(CSS) problem with M-ary quantized data under spectrum sensing data falsification (SSDF) …