[1] |
张平, 李建武, 冯志勇 ,等. 认知无线网络基础理论与关键技术研究[J]. 电信科学, 2014,30(2): 1-13.
|
|
ZHANG P , LI J W , FENG Z Y ,et al. Research on basic theory and key technology of cognitive radio network[J]. Telecommunications Science, 2014,30(2): 1-13.
|
[2] |
CHATTERJEE S , MAITY S P , ACHARYA T . Energy efficient cognitive radio system for joint spectrum sensing and data transmission[J]. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2014,4(3): 292-300.
|
[3] |
HONG X , WANG J , WANG C X . Cognitive radio in 5G:a perspective on energy-spectral efficiency tradeoff[J]. IEEE Communication Magazine, 2014,52(7): 46-53.
|
[4] |
陈涛 . 无线网络的物理层安全问题研究[D]. 广州:华南理工大学, 2013.
|
|
CHEN T . Study on physical security of wireless networks[D]. Guangzhou:South China University of Technology, 2013.
|
[5] |
CHEN C , CHENG H , YAO Y D . Cooperative spectrum sensing in cognitive radio networks in the presence of the primary user emulation attack[J]. IEEE Transactions on Wireless Communications, 2011,10(7): 2135-2141.
|
[6] |
ZHANG L , DING G , WU Q ,et al. Byzantine attack and defense in cognitive radio networks:a survey[J]. IEEE Communication Surveys and Tutorials, 2015,17(3): 1342-1363.
|
[7] |
LI J , FENG Z , FENG Z ,et al. A survey of security issues in cognitive radio networks[J]. China Communications, 2015,12(3): 132-150.
|
[8] |
ZOU Y , ZHU J , YANG L ,et al. Securing physical-layer communications for cognitive radio networks[J]. IEEE Communications Magazine, 2015,53(9): 48-54.
|
[9] |
MA J , ZHAO G D , LI Y . Soft combination and detection for cooperative spectrum sensing in cognitive radio networks[J]. IEEE Transactions on Wireless Communications, 2008,7(11): 4502-4507.
|
[10] |
ZHANG R Y , ZHAN Y F , PEI Y K ,et al. Weighted hard combination for cooperative spectrum sensing under noise uncertainty[J]. IEICE Transactions on Communications, 2014,97(2): 275-282.
|
[11] |
JIN Z , ANAND S , SUBBALAKSHMI K P . Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing[J]. ACM SIGMOBILE Mobile Computing and Communications Review, 2009,13(2): 74-85.
|
[12] |
JIN Z , SUBBALAKSHMI K P . Detecting primary user emulation attacks in dynamic spectrum access networks[C]// IEEE International Conference on Communications (ICC 2009),June 14-18,2009,Dresden,Germany. New Jersey:IEEE Press, 2009: 1-5.
|
[13] |
LIU F , CHEN H , XIE L . Maximum-minimum eigenvalue detection-based method to mitigate the effect of the PUEA in cognitive radio networks[C]// IEEE International Conference on Wireless Communications and Signal Processing (IEEE WCSP 2011),November 9-11,2011,Nanjing,China. New Jersey:IEEE Press, 2011: 1-5.
|
[14] |
鲍飞静 . 认知无线电网络中移动场景下主用户仿真攻击及其防御策略研究[D]. 杭州:浙江大学, 2013.
|
|
BAO F J . Research on primary user emulation attack and countermeasures with mobile secondary user in cognitive radio networks[D]. Hangzhou:Zhejiang University, 2013.
|
[15] |
王娇, 赵军辉, 杜家娇 . 基于跨层的认知无线电绿色网络关键技术综述[J]. 电信科学, 2014,30(3): 114-119.
|
|
WANG J , ZHAO J H , DU J J . Survey on cognitive radio green network with cross-layer technology[J]. Telecommunications Science, 2014,30(3): 114-119.
|
[16] |
ERYIGIT S , GUR G , BAYHAN S ,et al. Energy efficiency is a subtle concept:fundamental tradeoffs for cognitive radio networks[J]. IEEE Communication Magazine, 2014,52(7): 30-36.
|
[17] |
ALTHUNIBAT S , SUCASAS V , MARQUES H ,et al. On the tradeoff between security and energy efficiency in cooperative spectrum sensing for cognitive radio[J]. IEEE Communications Letters, 2013,17(8): 1564-1567.
|
[18] |
ZOU Y , ZHU J , WANG X ,et al. A survey on wireless security:technical challenges,recent advances,and future trends[J]. Proceedings of the IEEE, 2016,104(9): 1727-1765.
|