Search
Now showing items 11-12 of 12
Detecting the greedy spectrum occupancy threat in cognitive radio networks
(
IEEE Computer Society
, 2014 , Conference Paper)
Recently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a ...
Securing cognitive radio networks against primary user emulation attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ...