Security threats and countermeasures of MAC layer in cognitive radio networks

MR Manesh, N Kaabouch - Ad Hoc Networks, 2018 - Elsevier
Cognitive radio is a promising technology proposed to solve the scarcity of the radio
spectrum by opportunistically allocating the idle channels of the licensed users to …

Primary user emulation and jamming attack detection in cognitive radio via sparse coding

HM Furqan, MA Aygül, M Nazzal, H Arslan - EURASIP Journal on Wireless …, 2020 - Springer
Cognitive radio is an intelligent and adaptive radio that improves the utilization of the
spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user …

Current research trends on cognitive radio based internet of things (iot)

M Rezwanul Mahmood, MA Matin - Towards cognitive IoT networks, 2020 - Springer
The attractive features of Internet of Things (IoT) and the concept of cognitive radio have
raised the opportunity of creating a smart world. The advancement of cost-effective …

Detection of malicious primary user emulation based on a support vector machine for a mobile cognitive radio network using software-defined radio

E Cadena Munoz, LF Pedraza Martinez… - Electronics, 2020 - mdpi.com
Mobile cognitive radio networks provide a new platform to implement and adapt wireless
cellular communications, increasing the use of the electromagnetic spectrum by using it …

Availability-reliability-stability trade-offs in ultra-reliable energy-harvesting cognitive radio IoT networks

MR Amini, MW Baidas - IEEE Access, 2020 - ieeexplore.ieee.org
With the rise of the Internet-of-Things (IoT), new requirements have been brought into
communication networks to make them more efficient, sustainable, and self-sufficient …

Rényi entropy-based spectrum sensing in mobile cognitive radio networks using software defined radio

E Cadena Muñoz, LF Pedraza Martínez… - Entropy, 2020 - mdpi.com
A very important task in Mobile Cognitive Radio Networks (MCRN) is to ensure that the
system releases a given frequency when a Primary User (PU) is present, by maintaining the …

GWOA: a hybrid genetic whale optimization algorithm for combating attacks in cognitive radio network

SM Elghamrawy, AE Hassanien - Journal of Ambient Intelligence and …, 2019 - Springer
With the rapidly growing number of wireless users and systems more frequency bands are
needed, which led to the spectrum scarcity problems. Cognitive radio (CR) is an emerging …

Primary user emulation attacks: A detection technique based on Kalman filter

Z El Mrabet, Y Arjoune, H El Ghazi… - Journal of Sensor and …, 2018 - mdpi.com
Cognitive radio technology addresses the problem of spectrum scarcity by allowing
secondary users to use the vacant spectrum bands without causing interference to the …

Adaptive resource allocation scheme for cognitive radio vehicular ad‐hoc network in the presence of primary user emulation attack

D Das, S Das - IET Networks, 2017 - Wiley Online Library
Following the characteristics of the cognitive radio (CR) and the exponential increase of the
vehicles, it is envisioned to deploy CR in vehicular ad‐hoc network (VANET) in near future …

Knowledge Base Commons (KBCommons) v1. 0: A multi OMICS'web-based data integration framework for biological discoveries

S Zeng, Z Lyu, SRK Narisetti, D Xu… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Knowledge Base Commons (KBCommons) v1. 0 provides a comprehensive web resource
for storing, sharing, analyzing, exploring, and visualizing multi-organism genomics and multi …