[1] |
SAMEER S , GHOSH C , DHEKNE R P ,et al. Graph theoretic approach to QoS-guaranteed spectrum allocation in cognitive radio networks[C]// 2008 IEEE International Performance,Computing and Communication Conference. 2008: 354-359.
|
[2] |
XU T Y , DARWAZEH I . Non-orthogonal narrowband Internet of things:a design for saving bandwidth and doubling the number of connected devices[J]. IEEE Internet of Things Journal, 2018,5(3): 2120-2129.
|
[3] |
MITOLA J I , MAGUIRE G Q . Cognitive radio:making software radios more personal[J]. IEEE Personal Communications, 1999,6(4): 13-18.
|
[4] |
仝伟, 毛云龙, 陈庆军 ,等. 抗大数据分析的隐私保护:研究现状与进展[J]. 网络与信息安全学报, 2016,2(4): 44-55.
|
|
TONG W , MAO Y L , CHEN Q J ,et al. Survey of big-data-analysis-resistant privacy protection[J]. Chinese Journal of Network and Information Security. 2016,2(4): 44-55.
|
[5] |
FCC. Spectrum inventory table[EB].
|
[6] |
SESHUKUMAR K , SARAVANAN R , SURAJ M S . Spectrum sensing review in cognitive radio[C]// 2013 International Conference on Emerging Trends in VLSI,Embedded System,Nano Electronics and Telecommunication System(ICEVENT). 2013: 1-4.
|
[7] |
GUNTER C A , FATEMIETH O , FARHADI A ,et al. Using classification to protect the integrity of spectrum measurements in white space networks[C]// NDSS. 2011: 242-251.
|
[8] |
AKYILDIZ I F , LO B F , BALAKRISHNAN R . Cooperative spectrum sensing in cognitive radio networks:a survey[J]. Physical Communication, 2011,4(1): 40-62.
|
[9] |
裴庆祺, 李红宁, 赵弘洋 ,等. 认知无线电网络安全综述[J]. 通信学报, 2013,(1): 144-158.
|
|
PEI Q Q , LI H N , ZHAO H Y ,et al. Security in cognitive radio networks[J]. Journal on Communications. 2013,(1): 144-158.
|
[10] |
MIN A W , ZHANG X Y , SHIN K G . Detection of small-scale primary users in cognitive radio networks[J]. IEEE Journal on Selected Areas in Communications, 2011,29(2): 349-361.
|
[11] |
LI H S , . Learning the spectrum via collaborative filtering in cognitive radio networks[C]// 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum(DySPAN). 2010: 1-12.
|
[12] |
LI S , ZHU H J , GAO Z Y ,et al. Location privacy preservation in collaborative spectrum sensing[C]// 2012 Proceedings IEEE INFOCOM, 2012: 729-737.
|
[13] |
GRISSA M , HAMDAOUI B , YAVUZ A A . Location privacy in cognitive radio networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2017,19(3): 1726-1760.
|
[14] |
WANG W , ZHANG Q . Privacy-preserving collaborative spectrum sensing with multiple service providers[J]. IEEE Transactions on Wireless Communications, 2015,14(2): 1011-1019.
|
[15] |
CHEN T T , MAO Y L , ZHANG Y ,et al. Protecting location information in collaborative sensing of cognitive radio networks[C]// ACM International Conference on Modeling. 2015: 219-226.
|
[16] |
SHENG Z . Privacy,integrity,and incentive-compatibility in computations with untrusted parties[R]. 2004.
|
[17] |
RIFà P , HELENA , RIFà C ,et al. Spectrum sharing models in cognitive radio [C]// International Conference on Cyber-enabled Distributed Computing & Knowledge Discovery. 2011.
|
[18] |
LIU J , ZHANG C , DING H ,et al. Policy-based privacy-preserving scheme for primary users in databased-driven cognitive radio networks[C]// 2016 IEEE Global Communications Conference (GLOBECOM). 2016: 1-6.
|
[19] |
MIN A W , SHIN K G , HU X.Secure cooperative sensing in IEEE 802 . 22 WRANs using shadow fading correlation[J]. IEEE Transactions on Mobile Computing, 2011,10(10): 1434-1447.
|
[20] |
PRASANNA Y L , READY E M . A theoretical study of elliptic curve cryptography for location based services[C]// 2017 International Conference on Big Data Analytics and Computational Intelligence(ICBDAC). 2017: 404-407.
|
[21] |
SAIKIA M , BORUAH D . Implementation of ElGamal elliptic curve cryptography over prime field using C[C]// International Conference on Information Communication and Embedded Systems(ICICES2014). 2014: 1-7.
|
[22] |
林淑芬 . 基于椭圆曲线的数据加密系统的实现[D]. 厦门:厦门大学, 2012.
|
|
LIN S F . The Implementation of data encryption system based on elliptic curve[D]. Xiamen:Xiamen University, 2012.
|
[23] |
TEGUIG D , SCHEERS B , NIR V L . Data fusion schemes for cooperatives spectrum sensing in cognitive radio networks[C]// 2012 Military Communications and Information Systems Conference(MCC). 2012: 1-7.
|
[24] |
ZENG Y L , XU L , YANG X ,et al. An efficient privacy-preserving protocol for database-driven cognitive radio networks,Ad hoc networks[J]. 2018.
|
[25] |
苗新亮, 雷波, 刘栋 ,等. OpenSSL 中椭圆曲线点的压缩形式研究[J]. 网络安全技术与应用, 2015,(10): 92-93.
|
|
MIAO X L , LEI B , LIU D ,et al. Study on compression form of elliptic curve points in OpenSSL[J]. Network Security Technology &Application, 2015,(10): 92-93.
|
[26] |
李欣, . 组密钥管理技术研究及其在IPSec VPN中的应用[D]. 杭州:浙江大学, 2006.
|
|
LI X . Research of group key management and its application in IPSec VPN[D]. Hangzhou:Zhejiang University, 2006.
|