A survey of security challenges in cognitive radio networks: Solutions and future research directions

A Attar, H Tang, AV Vasilakos, FR Yu… - Proceedings of the …, 2012 - ieeexplore.ieee.org
In this survey, we present a comprehensive list of major known security threats within a
cognitive radio network (CRN) framework. We classify attack techniques based on the type …

Design Guidelines on Trust Management for Underwater Wireless Sensor Networks

R Zhu, A Boukerche, L Long… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
In recent years, significant advancements in wireless underwater communication and
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …

A survey of multi-agent trust management systems

H Yu, Z Shen, C Leung, C Miao, VR Lesser - IEEE Access, 2013 - ieeexplore.ieee.org
In open and dynamic multiagent systems (MASs), agents often need to rely on resources or
services provided by other agents to accomplish their goals. During this process, agents are …

A survey of trust and reputation management systems in wireless communications

H Yu, Z Shen, C Miao, C Leung… - Proceedings of the …, 2010 - ieeexplore.ieee.org
Trust is an important concept in human interactions which facilitates the formation and
continued existence of functional human societies. In the first decade of the 21st century …

An authenticated trust and reputation calculation and management system for cloud and sensor networks integration

C Zhu, H Nicanfar, VCM Leung… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Induced by incorporating the powerful data storage and data processing abilities of cloud
computing (CC) as well as ubiquitous data gathering capability of wireless sensor networks …

Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey

F Salahdine, N Kaabouch - Physical Communication, 2020 - Elsevier
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …

Exclusive use spectrum access trading models in cognitive radio networks: A survey

MR Hassan, GC Karmakar… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Spectrum frequency is a valuable resource for wireless communication but very limited in its
availability. Due to the extensive use and ever increasing demand of spectrum bands by …

A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks

A Ahmed, K Abu Bakar, MI Channa, K Haseeb… - Frontiers of Computer …, 2015 - Springer
Mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs) have gained
remarkable appreciation and technological development over the last few years. Despite …

Cognitive radio network security: A survey

S Parvin, FK Hussain, OK Hussain, S Han… - Journal of Network and …, 2012 - Elsevier
Recent advancements in wireless communication are creating a spectrum shortage problem
on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to …

Trust management for defending on-off attacks

Y Chae, LC DiPippo, YL Sun - IEEE Transactions on Parallel …, 2014 - ieeexplore.ieee.org
A trust management scheme can be used to aid an automated decision-making process for
an access control policy. Since unintentional temporary errors are possible, the trust …