Wireless Sensor Network

Volume 4, Issue 4 (April 2012)

ISSN Print: 1945-3078   ISSN Online: 1945-3086

Google-based Impact Factor: 1  Citations  

Research and Analysis on Cognitive Radio Network Security

HTML  XML Download Download as PDF (Size: 411KB)  PP. 120-126  
DOI: 10.4236/wsn.2012.44017    8,934 Downloads   16,134 Views  Citations
Author(s)

ABSTRACT

This paper firstly gives a detail analysis on the security problems faced in cognitive radio network, and introduces the basic issues about cognitive radio network. Then, according to the differences between cognitive radio network and existing wireless network, it analyses and discusses the dynamic spectrum access security and artificial intelligence. Finally, it draws a conclusion to security problems of cross layer design.

Share and Cite:

L. Tang and J. Wu, "Research and Analysis on Cognitive Radio Network Security," Wireless Sensor Network, Vol. 4 No. 4, 2012, pp. 120-126. doi: 10.4236/wsn.2012.44017.

Cited by

[1] Applications of Artificial Intelligence and IoT in the Development of Sports Training Education Management.
Wireless Communications & Mobile …, 2022
[2] Fuzzy logic based authentication in cognitive radio networks
International Journal of …, 2022
[3] 5G Network Deployment in Nigeria: Key Challenges and The Way Forward
2021
[4] Block Chain Based Cognitive Wireless Networks: Challenges & Applications
2021 6th International Conference on …, 2021
[5] Parallelising reception and transmission in queues of secondary users
2019
[6] Parallelising reception and transmission in queues of secondary users.
2019
[7] Authentication of Crns by Using BAN Logic
2019
[8] 118,000 130M
2018
[9] Development of secured data transmission using machine learning-based discrete-time partially observed Markov model and energy optimization in cognitive radio …
Neural Computing and Applications, 2018
[10] Spectrum Sensing and Mitigation of Primary User Emulation Attack in Cognitive Radio
Cognitive Radio in 4G/5G Wireless Communication Systems, 2018
[11] Multi-selfish attacks and detection in cognitive radio network using CRV
2017
[12] Performance analysis of a novel decentralised MAC protocol for cognitive radio networks
2016
[13] Угрозы качеству работы сетей когнитивного радио
2016
[14] Secure and reliable routing in cognitive radio networks
Wireless Networks, 2016
[15] Towards Security Issues and Solutions in Cognitive Radio Networks
Big Data: Concepts, Methodologies, Tools, and Applications, 2015
[16] A Survey on Security Aspects of Cross Layer Design in Cognitive Network
2015
[17] Synoptic analysis techniques for intrusion detection in wireless networks
2015
[18] Attacks in Cognitive Radio Networks (CRN)-a Survey
Indian Journal of Science and Technology, 2014
[19] Cooperative detection of primary user emulation attacks based on channel–tap power in mobile cognitive radio networks
International Journal of Ad Hoc and Ubiquitous Computing, 2014
[20] A layered approach to cognitive radio network security: A survey
Computer Networks, 2014
[21] Analysis on the Application of Artificial Intelligence Technology in Modern Physical Education
Information Technology Journal, 2014
[22] Yipai Jiang
2014
[23] Security issues with 802.22 Wireless Regional Area Network (WRAN)
Project Report:Security issues with 802.22 Wide Regional Area Network (WRAN), 2013
[24] Trust Based Algorithm for Secure Spectrum Access in Cognitive Radio Networks
PV KJ, V Vijayarangan - confianzit.org, 2013
[25] Project: Security issues with 802.22 Wide Regional Area Network (WRAN)
2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.