Introduction to Reinforcement Learning
Introduction to Reinforcement Learning
Security in multiagent systems by policy randomization
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Collaborative Multiagent Reinforcement Learning by Payoff Propagation
The Journal of Machine Learning Research
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
Electronic Notes in Theoretical Computer Science (ENTCS)
Improving sensing accuracy in cognitive PANs through modulation of sensing probability
Mobile Information Systems - Advances in Mobile Communications and Computing
Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Coordinating Randomized Policies for Increasing Security in Multiagent Systems
Safety and Security in Multiagent Systems
Anti-PUE attack base on the transmitter fingerprint identification in cognitive radio
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Dogfight in spectrum: jamming and anti-jamming in multichannel cognitive radio systems
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Optimal power allocation strategy against jamming attacks using the Colonel Blotto game
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
IEEE Journal on Selected Areas in Communications
Secure communication over MISO cognitive radio channels
IEEE Transactions on Wireless Communications
A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks
CMC '10 Proceedings of the 2010 International Conference on Communications and Mobile Computing - Volume 02
Adaptive QoS-aware channel access scheme for Cognitive Radio networks
International Journal of Ad Hoc and Ubiquitous Computing
Power fingerprinting in SDR & CR integrity assessment
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Distributed Shared Spectrum Techniques for Cognitive Wireless Radio Networks
CICN '10 Proceedings of the 2010 International Conference on Computational Intelligence and Communication Networks
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
LCN '10 Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks
Cryptographic link signatures for spectrum usage authentication in cognitive radio
Proceedings of the fourth ACM conference on Wireless network security
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Privacy protection on Vehicular Ad hoc NETworks
International Journal of Ad Hoc and Ubiquitous Computing
Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems
International Journal of Ad Hoc and Ubiquitous Computing
Security for multipath TCP: a constructive approach
International Journal of Internet Protocol Technology
A survey of Intrusion Detection Systems for Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
IEEE Transactions on Signal Processing
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Toward secure distributed spectrum sensing in cognitive radio networks
IEEE Communications Magazine
An Anti-Jamming Stochastic Game for Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Cognitive Radio CR enables Secondary Users SUs to observe, learn and take the right action on its operating environment at any time instant. This feature has inevitably exposed the SUs to artificial intelligence attacks from adversaries. This paper provides a survey on various kinds of attacks, as well as reviews and proposes mitigation approaches to tackle them from a multi-agent perspective. Additionally, this paper shows the impact and criticality of artificial intelligence attacks on network-wide performance. We aim to establish a foundation, and to spark new research interests in this new and critical area.