[1] |
MITOLA J . Cognitive radio:making software radio more personal[J]. IEEE Personal Communication, 1999,6(4): 13-18.
|
[2] |
AKYILDIZ I F , LEE W Y , VURAN M C ,et al. Next generation/dynamic spectrum access/cognitive radio wireless networks:a survey[J]. Computer Networks, 2006,50(9): 2127-2159.
|
[3] |
CHOWDHURY KR , AKYILDIZ I F . Cognitive wireless Mesh networks with dynamic spectrum access[J]. IEEE Journal on Selected Areas in Communications, 2008,26(1): 168-181.
|
[4] |
邝祝芳, 陈志刚, 邓晓衡 . 自适应的认知无线Mesh网络QoS约束的由与频谱分配算法[J]. 通信学报, 2011,32(11): 59-70. KUANG Z F , CHEN Z G , DENG X H . Self-adaptivejoint routing and spectrum allocation algorithm with QoS constraints in cognitive wireless Mesh networks[J]. Journal on Communications, 2011,32(11): 59-70.
|
[5] |
PARVINA S , HUSSAINB F K , HUSSAINB O K ,et al. Cognitive radio network security:a survey[J]. Journal of Network and Computer Applications, 2012,35(6): 1691-1708.
|
[6] |
裴庆祺, 李红宁, 赵弘洋 等. 认知无线电网络安全综述[J].通信学报,2013,34(1):144-158. 通信学报, 2013,34(1): 144-158. PEI Q Q , LI H N , ZHAO H Y ,et al. Security in cognitive radio net works[J]. Journal on Communications, 2013,34(1): 144-158.
|
[7] |
FRAGKIADAKIS A G , TRAGOS E Z , ASKOXYLAKIS I G . A survey on security threats and detection techniques in cognitive radio networks[J].IEEE Communications Surveys & Tutorials,2013,15(1),428-445. IEEE Communications Surveys&Tutorials, 2013,15(1): 428-445.
|
[8] |
XIN C S , SONG M . Detection of PUE attacks in cognitive radio networks based on signal activity pattern[J]. IEEE Transactions on Mobile Computing, 2014,13(5): 1022-1034.
|
[9] |
RAWAT A S , ANAND P , CHEN H ,et al. Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks[J]. IEEE Transactions on Signal Processing, 2011,59(2): 774-786.
|
[10] |
AKTER L , NATARAAN B . Distributed approach for power and rate allocation to secondary user in cognitive radio network[J].IEEE Transactions on Vehicular Technology,2011,60(4):1526-1538.IEEE Transactions on Vehicular Technology, 2011,60(4): 1526-1538.
|
[11] |
CHEN R L , PARK J M , HOU Y T ,et al. Toward secure distributed spectrum sensing in cognitive radio network[J]. IEEE Communications Magazine, 2008,46(4): 50-55.
|
[12] |
YI P , TONG T H , LIU N ,et al. Security in wireless Mesh networks:challenges and solutions[A]. International Conference on Information Technology[C]. New Generations, 2009. 423-428.
|
[13] |
LIN H , HU J , MA J F ,et al. A role based privacy-aware secure routing protocol for wireless Mesh networks[J]. Wireless Personal Communications, 2014,75(3): 1611-1633.
|
[14] |
AGRAWAL S , JAIN S , SHARMA S . A survey of routing attacks and security measures in mobile Ad-Hoc networks[J]. Journal of Computing, 2011,3(1): 41-48.
|
[15] |
ZIN S M , ANUARA N B , KIAHA M L M ,et al. Routing protocol design for secure WSN:review and open research issues[J]. Journal of Network and Computer Applications, 2014,41(1): 517-530.
|
[16] |
YOUSSEF M , IBRAHIM M , ABDELATF M ,et al. Routing metrics of cognitive radio networks a survey[J]. IEEE Communications Surveys & Tutorials, 2014,16(1): 92-109.
|
[17] |
DING Y , XIAO L . Video on demand streaming in cognitive wireless Mesh networks[J]. IEEE Transactions on Mobile Computing, 2013,12(3): 412-423.
|
[18] |
MUMEY B , TANG J , JUDSON I R ,et al. On routing and channel selection in cognitive radio Mesh networks[J]. IEEE Transactions on Vehicular Technology, 2012,61(9): 4118-4128.
|
[19] |
WU G F , ZHAG J , HE Z P . A trust mechanism-based channel assignment and routing scheme in cognitive wireless Mesh networks with intrusion detection[J]. Journal of Electronics (China), 2010,27(5): 728-734.
|
[20] |
GUO J W , ZHOU X W . Secure distributed routing algorithm with optimizing energy consumption for cognitive radio networks[J]. Wireless Personal Communications, 2013,72(4): 2533-2550.
|
[21] |
YUAN Z , HAN Z , SUN Y L ,et al. Routing toward primary user attack and belief propagation-based defense in cognitive radio networks[J]. IEEE Transactions on Mobile Computing, 2013,12(9): 1750-1760.
|
[22] |
ZHU Q Y , SONG J B,BASART . Dynamic secure routing game in distributed cognitive radio networks[A]. 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011)[C]. 2011. 1-6.
|
[23] |
HOW K C , MA M , QIN Y . A cross-layer selfishness avoidance routing protocol for the dynamic cognitive radio networks[A]. 2011 IEEE GLOBECOM Workshops[C]. 2011: 942-946.
|
[24] |
张光华, 张玉清, 刘雪峰 . 认知无线电网络中基于信任的安全路由模型[J]. 通信学报, 2013,34(2): 56-64. ZHANG G H , ZHANG Y Q , LIU X F . Trust based secure routing model for cognitive radio networks[J]. Journal on Communications, 2013,34(2): 56-64.
|
[25] |
JO M , HAN L Z , KIM D ,et al. Selfish attacks and detection in cognitive radio Ad-Hoc network[J]. IEEE Network, 2013,27(3): 45-50.
|
[26] |
SORRELLS C , POTIER P , QIAN L J ,et al. Anomalous spectrum usage attack detection in cognitive radio wireless network[A]. 2011 IEEE International Conference on Technologies for Homeland Security (HST)[C]. 2011. 384-189.
|
[27] |
FALL K , VARADHAN K . NS manual[EB/OL]. .
|