参考文献
[1]Fcc E T.Notice of Proposed Rule Making and Order[Z].2003.
[2]Mitola J,Maguire G J.Cognitive Radio:Making Software Radios More Personal[J].IEEE Personal Communications,1999,6(4):13-18.
[3]Chen Z,Cooklev T,Chen C,et al.Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks[C]//Proceedings of IPCCC’09.Phoenix,USA:IEEE Press,2009:208-215.
[4]Prasad R.Special Issue on Cognitive Radio Techno-logies[J].Wireless Personal Communications,2008,45(3):277-279.
[5]Anand S,Jin Z,Subbalakshmi K P.An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks[C]//Proceedings of NFDSAN’08.Chicago,USA:IEEE Press,2008:1-6.
[6]肖天梅.认知无线电PUE攻击下次用户性能分析[J].通信技术,2013,46(4):22-27.
[7]Chen Ruiliang,Park J M,Reed J H.Defense Against Primary User Emulation Attacks in Cognitive Radio Networks[J].IEEE Journal on Selected Areas in Communications,2008,26(1):25-37.
[8]Zhao Caidan,Wang Wumei,Huang Lianfen,et al.Anti-PUE Attack Based on the Transmitter Fingerprint IdenTification in Cognitive Radio[C]//Proceedings of the 5th International Conference on Wireless Com-munications,Networking and Mobile Computing.Beijing,China:[s.n.],2009:1-5.
[9]Chen Ruiliang,Park J M.Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks[C]//Proceedings of the 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.Reston,USA:IEEE Press,2006:110-119.
[10]逄德明,胡罡,徐明.基于能量指纹匹配的无线认知网络仿冒主用户攻击检测[J].计算机科学,2011,38(3):28-33.
[11]Jin Z,Anand S,Subbalakshmi K P.Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks[C]//Proceedings of the IEEE International Conference on Communications.Dresden,Germany:IEEE Press,2009:1-5.
[12]Afolabi O R,Kim K,Ahmad A.On Secure Spectrum Sensing in Cognitive Radio Networks Using Emiters Electromagnetic Signature[C]//Proceedings of Inter-national Conference on Computer Communications and Networks.San Francisco,USA:IEEE Press,2009,1-5.
[13]Pu D,Shi Y,Ilyashenko A V,et al.Detecting Primary User Emulation Attack in Cognitive Radio Networks[C]//Proceedings of Global Telecommunications Conference.Houston,USA:IEEE Presss,2011:1-5.
[14]Borle K M,Chen B,Du W.A Physical Layer Authentication Scheme for Countering Primary User Emulation Attack[C]//Proceedings of the 38th IEEE International Conference on Acoustics,Speech and Signal Processing.Vancouver,Canada:IEEE Press,2013:2935-2939.
[15]薛楠,周贤伟,辛晓,等.一种解决认知无线电网络模仿主用户攻击问题的方案[J].计算机科学,2009,36(8):45-47.
[16]施荣华,翁丽萍.基于单向哈希链的Ad Hoc网络密钥协商协议[J].湖南大学学报:自然科学版,2011,38(3):77-81.
[17]王夏辉.Hash函数在无线传感器网络中的应用研究[D].北京:北京化工大学,2013.
[18]姜楠.混沌函数及其在电子商务中的应用研究[D].大连:大连理工大学,2009.
[19]李红宁.认知无线电安全性研究[D].西安:西安电子科技大学,2010.
编辑索书志
|