A survey of security challenges in cognitive radio networks: Solutions and future research directions
A Attar, H Tang, AV Vasilakos, FR Yu… - Proceedings of the …, 2012 - ieeexplore.ieee.org
In this survey, we present a comprehensive list of major known security threats within a
cognitive radio network (CRN) framework. We classify attack techniques based on the type …
cognitive radio network (CRN) framework. We classify attack techniques based on the type …
Design Guidelines on Trust Management for Underwater Wireless Sensor Networks
R Zhu, A Boukerche, L Long… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
In recent years, significant advancements in wireless underwater communication and
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …
A survey of multi-agent trust management systems
In open and dynamic multiagent systems (MASs), agents often need to rely on resources or
services provided by other agents to accomplish their goals. During this process, agents are …
services provided by other agents to accomplish their goals. During this process, agents are …
A survey of trust and reputation management systems in wireless communications
Trust is an important concept in human interactions which facilitates the formation and
continued existence of functional human societies. In the first decade of the 21st century …
continued existence of functional human societies. In the first decade of the 21st century …
An authenticated trust and reputation calculation and management system for cloud and sensor networks integration
Induced by incorporating the powerful data storage and data processing abilities of cloud
computing (CC) as well as ubiquitous data gathering capability of wireless sensor networks …
computing (CC) as well as ubiquitous data gathering capability of wireless sensor networks …
Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey
F Salahdine, N Kaabouch - Physical Communication, 2020 - Elsevier
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …
Exclusive use spectrum access trading models in cognitive radio networks: A survey
MR Hassan, GC Karmakar… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Spectrum frequency is a valuable resource for wireless communication but very limited in its
availability. Due to the extensive use and ever increasing demand of spectrum bands by …
availability. Due to the extensive use and ever increasing demand of spectrum bands by …
A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained
remarkable appreciation and technological development over the last few years. Despite …
remarkable appreciation and technological development over the last few years. Despite …
Cognitive radio network security: A survey
S Parvin, FK Hussain, OK Hussain, S Han… - Journal of Network and …, 2012 - Elsevier
Recent advancements in wireless communication are creating a spectrum shortage problem
on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to …
on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to …
Trust management for defending on-off attacks
A trust management scheme can be used to aid an automated decision-making process for
an access control policy. Since unintentional temporary errors are possible, the trust …
an access control policy. Since unintentional temporary errors are possible, the trust …