Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Defeating primary user emulation attacks using belief propagation in cognitive radio networks
Cognitive radio (CR) is a promising technology for future wireless spectrum allocation to
improve the usage of the licensed bands. However, CR wireless networks are susceptible to …
improve the usage of the licensed bands. However, CR wireless networks are susceptible to …
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, part i: Known channel statistics
In cognitive radio systems, primary user emulation (PUE) attack means that an attacker
sends primary-user-like signals during the spectrum sensing period such that honest …
sends primary-user-like signals during the spectrum sensing period such that honest …
A survey: Spoofing attacks in physical layer security
Increasing demand on wireless communications also increases the issues related to
communication security. Among different security solutions, physical layer security have …
communication security. Among different security solutions, physical layer security have …
A survey on security issues in cognitive radio based cooperative sensing
Cognitive radio based cooperative spectrum sensing (CSS) is severely affected when some
secondary users maliciously attack it. Two attacks regarded as key adversaries to the …
secondary users maliciously attack it. Two attacks regarded as key adversaries to the …
Attack prevention for collaborative spectrum sensing in cognitive radio networks
Collaborative spectrum sensing is vulnerable to data falsification attacks, where malicious
secondary users (attackers) submit manipulated sensing reports to mislead the fusion …
secondary users (attackers) submit manipulated sensing reports to mislead the fusion …
On identifying primary user emulation attacks in cognitive radio systems using nonparametric bayesian classification
Primary user emulation (PUE) attacks, where attackers mimic the signals of primary users
(PUs), can cause significant performance degradation in cognitive radio (CR) systems …
(PUs), can cause significant performance degradation in cognitive radio (CR) systems …
On the efficacy of frequency hop** in co** with jamming attacks in 802.11 networks
K Pelechrinis, C Koufogiannakis… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Frequency hop** (FH) has been the most popularly considered approach for alleviating
the effects of jamming attacks. We re-examine, the efficacy of FH based on both …
the effects of jamming attacks. We re-examine, the efficacy of FH based on both …
Impact of primary user emulation attacks on dynamic spectrum access networks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic
spectrum access (DSA) networks. While there have been studies in the literature to detect …
spectrum access (DSA) networks. While there have been studies in the literature to detect …
Defense management mechanism for primary user emulation attack based on evolutionary game in energy harvesting cognitive industrial Internet of Things
J Wang, H Pei, R Wang, R Lin… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Cognitive Industrial Internet of Things (CIIoT) permits Secondary Users (SUs) to use the
spectrum bands owned by Primary Users (PUs) opportunistically. However, in the absence …
spectrum bands owned by Primary Users (PUs) opportunistically. However, in the absence …
Jamming and anti‐jamming in interference channels: a stochastic game approach
This study considers jamming and anti‐jamming in interference channels by way of smart
hop**; and differs from the existing research studies that focus on random hop** in …
hop**; and differs from the existing research studies that focus on random hop** in …