Journal on Communications ›› 2014, Vol. 35 ›› Issue (11): 69-80.doi: 10.11959/j.issn.1000-436x.2014.11.008
• secure communication • Previous Articles Next Articles
Zhu-fang KUANG1,Zhi-gang CHEN2,Guo-jun WANG2,Hui LIU3
Online:
2014-11-25
Published:
2017-06-20
Supported by:
Zhu-fang KUANG,Zhi-gang CHEN,Guo-jun WANG,Hui LIU. Secure and high throughput routing protocol with QoS constraints in cognitive wireless Mesh networks[J]. Journal on Communications, 2014, 35(11): 69-80.
[1] | MITOLA J . Cognitive radio:making software radio more personal[J]. IEEE Personal Communication, 1999,6(4): 13-18. |
[2] | AKYILDIZ I F , LEE W Y , VURAN M C ,et al. Next generation/dynamic spectrum access/cognitive radio wireless networks:a survey[J]. Computer Networks, 2006,50(9): 2127-2159. |
[3] | CHOWDHURY KR , AKYILDIZ I F . Cognitive wireless Mesh networks with dynamic spectrum access[J]. IEEE Journal on Selected Areas in Communications, 2008,26(1): 168-181. |
[4] | 邝祝芳, 陈志刚, 邓晓衡 . 自适应的认知无线Mesh网络QoS约束的由与频谱分配算法[J]. 通信学报, 2011,32(11): 59-70. KUANG Z F , CHEN Z G , DENG X H . Self-adaptivejoint routing and spectrum allocation algorithm with QoS constraints in cognitive wireless Mesh networks[J]. Journal on Communications, 2011,32(11): 59-70. |
[5] | PARVINA S , HUSSAINB F K , HUSSAINB O K ,et al. Cognitive radio network security:a survey[J]. Journal of Network and Computer Applications, 2012,35(6): 1691-1708. |
[6] | 裴庆祺, 李红宁, 赵弘洋 等. 认知无线电网络安全综述[J].通信学报,2013,34(1):144-158. 通信学报, 2013,34(1): 144-158. PEI Q Q , LI H N , ZHAO H Y ,et al. Security in cognitive radio net works[J]. Journal on Communications, 2013,34(1): 144-158. |
[7] | FRAGKIADAKIS A G , TRAGOS E Z , ASKOXYLAKIS I G . A survey on security threats and detection techniques in cognitive radio networks[J].IEEE Communications Surveys & Tutorials,2013,15(1),428-445. IEEE Communications Surveys&Tutorials, 2013,15(1): 428-445. |
[8] | XIN C S , SONG M . Detection of PUE attacks in cognitive radio networks based on signal activity pattern[J]. IEEE Transactions on Mobile Computing, 2014,13(5): 1022-1034. |
[9] | RAWAT A S , ANAND P , CHEN H ,et al. Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks[J]. IEEE Transactions on Signal Processing, 2011,59(2): 774-786. |
[10] | AKTER L , NATARAAN B . Distributed approach for power and rate allocation to secondary user in cognitive radio network[J].IEEE Transactions on Vehicular Technology,2011,60(4):1526-1538.IEEE Transactions on Vehicular Technology, 2011,60(4): 1526-1538. |
[11] | CHEN R L , PARK J M , HOU Y T ,et al. Toward secure distributed spectrum sensing in cognitive radio network[J]. IEEE Communications Magazine, 2008,46(4): 50-55. |
[12] | YI P , TONG T H , LIU N ,et al. Security in wireless Mesh networks:challenges and solutions[A]. International Conference on Information Technology[C]. New Generations, 2009. 423-428. |
[13] | LIN H , HU J , MA J F ,et al. A role based privacy-aware secure routing protocol for wireless Mesh networks[J]. Wireless Personal Communications, 2014,75(3): 1611-1633. |
[14] | AGRAWAL S , JAIN S , SHARMA S . A survey of routing attacks and security measures in mobile Ad-Hoc networks[J]. Journal of Computing, 2011,3(1): 41-48. |
[15] | ZIN S M , ANUARA N B , KIAHA M L M ,et al. Routing protocol design for secure WSN:review and open research issues[J]. Journal of Network and Computer Applications, 2014,41(1): 517-530. |
[16] | YOUSSEF M , IBRAHIM M , ABDELATF M ,et al. Routing metrics of cognitive radio networks a survey[J]. IEEE Communications Surveys & Tutorials, 2014,16(1): 92-109. |
[17] | DING Y , XIAO L . Video on demand streaming in cognitive wireless Mesh networks[J]. IEEE Transactions on Mobile Computing, 2013,12(3): 412-423. |
[18] | MUMEY B , TANG J , JUDSON I R ,et al. On routing and channel selection in cognitive radio Mesh networks[J]. IEEE Transactions on Vehicular Technology, 2012,61(9): 4118-4128. |
[19] | WU G F , ZHAG J , HE Z P . A trust mechanism-based channel assignment and routing scheme in cognitive wireless Mesh networks with intrusion detection[J]. Journal of Electronics (China), 2010,27(5): 728-734. |
[20] | GUO J W , ZHOU X W . Secure distributed routing algorithm with optimizing energy consumption for cognitive radio networks[J]. Wireless Personal Communications, 2013,72(4): 2533-2550. |
[21] | YUAN Z , HAN Z , SUN Y L ,et al. Routing toward primary user attack and belief propagation-based defense in cognitive radio networks[J]. IEEE Transactions on Mobile Computing, 2013,12(9): 1750-1760. |
[22] | ZHU Q Y , SONG J B,BASART . Dynamic secure routing game in distributed cognitive radio networks[A]. 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011)[C]. 2011. 1-6. |
[23] | HOW K C , MA M , QIN Y . A cross-layer selfishness avoidance routing protocol for the dynamic cognitive radio networks[A]. 2011 IEEE GLOBECOM Workshops[C]. 2011: 942-946. |
[24] | 张光华, 张玉清, 刘雪峰 . 认知无线电网络中基于信任的安全路由模型[J]. 通信学报, 2013,34(2): 56-64. ZHANG G H , ZHANG Y Q , LIU X F . Trust based secure routing model for cognitive radio networks[J]. Journal on Communications, 2013,34(2): 56-64. |
[25] | JO M , HAN L Z , KIM D ,et al. Selfish attacks and detection in cognitive radio Ad-Hoc network[J]. IEEE Network, 2013,27(3): 45-50. |
[26] | SORRELLS C , POTIER P , QIAN L J ,et al. Anomalous spectrum usage attack detection in cognitive radio wireless network[A]. 2011 IEEE International Conference on Technologies for Homeland Security (HST)[C]. 2011. 384-189. |
[27] | FALL K , VARADHAN K . NS manual[EB/OL]. . |
[1] | Dan-yang QIN,Shuang JIA,Song-xiang YANG,Jing-ya MA,Yan ZHANG,Qun DING. Research on trust sensing based secure routing mechanism for wireless sensor network [J]. Journal on Communications, 2017, 38(10): 60-70. |
[2] | Peng YANG,Yang TANG,Na SHU,Ru-yan WANG. Secure supply and demand relationship perception routing in intermittently connected wireless networks [J]. Journal on Communications, 2015, 36(Z1): 42-52. |
[3] | Rui-fang LI,Quan LIU,Ren-fa LI. Differentiated services dynamic spectrum access strategy for cognitive wireless mesh network [J]. Journal on Communications, 2014, 35(3): 69-76. |
[4] | . Differentiated services dynamic spectrum access strategy for cognitive wireless mesh network [J]. Journal on Communications, 2014, 35(3): 8-76. |
[5] | . Secure and high throughput routing protocol with QoS constraints in cognitive wireless Mesh networks [J]. Journal on Communications, 2014, 35(11): 8-66. |
[6] | Juan LUO,Chuan-chuan LIU,Ren-fa LI. Wireless virtual network embedding algorithm based on link reliability [J]. Journal on Communications, 2012, 33(Z1): 88-95. |
[7] | Xian GUO,Tao FENG,Zhan-ting YUAN. Coding-aware secure routing for multi-hop wireless networks [J]. Journal on Communications, 2012, 33(6): 133-142. |
[8] | Zhu-fang KUANG,Zhi-gang CHEN,Xiao-heng DENG. Self-adaptive joint routing and spectrum allocation algorithm with QoS constraints in cognitive wireless Mesh networks [J]. Journal on Communications, 2011, 32(11): 59-70. |
[9] | Chao WANG,Xiang-yu JIA,Qiang LIN. Trust based secure routing algorithm for wireless sensor networks [J]. Journal on Communications, 2008, 29(11): 105-113. |
[10] | Qing-qi PEI,Yu-long SHEN,Jian-feng MA. Survey of wireless sensor network security techniques [J]. Journal on Communications, 2007, 28(8): 113-122. |
[11] | En YUAN,Xiang-lan YIN,Wang-dong QI. Secure diffusion tree routing protocol in WSN [J]. Journal on Communications, 2007, 28(11A): 147-151. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|