Wireless Communications
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks
Cognitive radio network architecture: part II -- trusted network layer structure
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Pervasive and Mobile Computing
Threats Identification and their Solution in Inter-Basestation Dynamic Resource Sharing IEEE-802.22
ICHIT '08 Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology
CRAHNs: Cognitive radio ad hoc networks
Ad Hoc Networks
Trusted cognitive radio networking
Wireless Communications & Mobile Computing
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks
CMC '10 Proceedings of the 2010 International Conference on Communications and Mobile Computing - Volume 02
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Location-based authentication protocol for first cognitive radio networking standard
Journal of Network and Computer Applications
Cryptographic link signatures for spectrum usage authentication in cognitive radio
Proceedings of the fourth ACM conference on Wireless network security
An Efficient Authentication Mechanism for Cognitive Radio Networks
APPEEC '11 Proceedings of the 2011 Asia-Pacific Power and Energy Engineering Conference
Authenticating hard decision sensing reports in cognitive radio networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Linear QoS Goals of Additive and Concave Metrics in Ad Hoc Cognitive Packet Routing
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Secure Minimum-Energy Multicast Tree Based on Trust Mechanism for Cognitive Radio Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In cognitive radio networks, the non-cooperative behavior is an inherent security issue. Then it is important to guarantee the support of the cooperation among nodes. In this paper, first the distributed routing problems with optimizing energy use are translated into a 0---1 integer programming problem by analyzing the dynamical power interference among nodes. Secondly, the key allocation about end nodes is devised to realize the confidentiality about data transmission. Thirdly, a secure distributed routing algorithm (SDRA) with energy use is proposed to ensure the security on end-to-end communication. The simulation and analysis show that the energy use for the SDRA is lower than that of the spectrum and energy aware routing protocol. Moreover, the trust mechanism based on Bayesian theorem is more compatible than that of Beta function for distributed routing algorithm in the actual situation.