Securing cognitive radio networks using blockchains

A Sajid, B Khalid, M Ali, S Mumtaz, U Masud… - Future Generation …, 2020 - Elsevier
Due to the increase in industrial applications of Internet of Things (IoT), number of internet
connected devices have been increased accordingly. This has resulted in big challenges in …

A layered approach to cognitive radio network security: A survey

D Hlavacek, JM Chang - Computer Networks, 2014 - Elsevier
Cognitive radios have been identified as a solution to the crowded spectrum issue. With the
realization of cognitive radio networks came the recognition that both new and old security …

Support vector machine approach of malicious user identification in cognitive radio networks

K Arshid, Z Jianbiao, I Hussain, GG Lema, M Yaqub… - Wireless …, 2022 - Springer
In cognitive radio network (CRN), effective spectrum management provides better quality of
service. The spectrum is limited but the significance of the spectrum is increasing at each …

[PDF][PDF] A credibility-based defense SSDF attacks scheme for the expulsion of malicious users in cognitive radio

H Du, S Fu, H Chu - International Journal of hybrid information …, 2015 - gvpress.com
Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed
spectrum in an opportunistic manner. However, the security aspects of cognitive radio …

A secure collaborative spectrum sensing strategy in cyber-physical systems

H Lin, J Hu, J Ma, L Xu, Z Yu - IEEE Access, 2017 - ieeexplore.ieee.org
Cyber-physical systems (CPS) have the great potential to transform people's lives. Smart
cities, smart homes, robot assisted living, and intelligent transportation systems are …

Secure cooperative spectrum sensing and allocation in distributed cognitive radio networks

H Lin, J Hu, C Huang, L Xu… - International Journal of …, 2015 - journals.sagepub.com
Cognitive radio networks (CRNs) are an emerging wireless communications technique for
resolving the significant spectrum scarcity problem. Despite their promising characteristics …

A soft cooperative spectrum sensing in the presence of most destructive smart PUEA using energy detector

M Emami, H Zarrabi, MR Jabbarpour… - Concurrency and …, 2018 - Wiley Online Library
Recently, the growth of Internet of Things (IoT) and its remarkable impacts on human well‐
being life style are deniable. On the connectivity side, IoT is highly related to Wireless …

Soft cooperative spectrum sensing using quantization method in the presence of smart PUE attack

M Emami, MR Jabbarpour, B Abolhassani… - Mobile Networks and …, 2017 - Springer
To overcome the frequency spectrum scarcity, cognitive radio (CR) network is proposed
where secondary users opportunistically use vacant frequency band. CR intrinsic properties …

Location verification system for pilot spoofing attack detection

R Zhu, N Li, X Tao, L Gao - 2019 IEEE 30th Annual …, 2019 - ieeexplore.ieee.org
Pilot spoofing attack happens in the physical layer during the uplink pilot training stage. A
malicious adversary sends identical pilot signals as a legitimate user, which can disrupt …

[PDF][PDF] Security issues in cognitive radio networks

T Zhang - Cognitive Networks: Towards Self-Aware Networks, 2014 - prism.ucalgary.ca
Cognitive radio is an emerging trend to solve the problem of scarce spectrum resources in
the prosperous area of wireless communication. By dynamically utilizing unoccupied …