Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks
Tài liệu tham khảo
Akyildiz, 2009, CRAHNs, Ad Hoc Netw., 7, 810, 10.1016/j.adhoc.2009.01.001
Akyildiz, 2011, Cooperative spectrum sensing in cognitive radio networks, Phys. Commun., 4, 40, 10.1016/j.phycom.2010.12.003
Boukerche, A., Ren, Y., Pazzi, R., 2009. An adaptive computational trust model for mobile ad hoc networks. In: Proceedings of the 5th International Conference on Wireless Communications and Mobile Computing, pp. 191–195.
Cha, J.C., Cheon, J.H., 2003. An identity-based signature from gap Diffie–Hellman groups. In: Proceeding of 6th International Workshop on Practice and Theory in Public Key Cryptography, pp. 18–30.
Chen, 2008, Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Commun. Magaz., 46, 50, 10.1109/MCOM.2008.4481340
Fang, 2016, BTRES, J. Netw. Comput. Appl., 59, 88, 10.1016/j.jnca.2015.06.013
Federal Communications Commission, 2002. Spectrum policy task force. 〈http://transition.fcc.gov/sptf/files/0801fcc.pdf〉 (accessed 15.08.09).
Feng, 2015, Behave well, KSII Trans. Int. Inf. Syst., 9, 1321
Gamma function. 〈http://www.en.wikipedia.org/wiki/Gamma_function〉(accessed 15.10.11).
IEEE Standard 1609.2 – IEEE Trial-Use Standard for Wireless Access in Vehicular Environments – Security Services for Applications and Management Messages, 2006.
Jiang, Y.X., Shi, M.H., Shen, X.M., et al., 2009. BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wirel. Commun. 8 (4), 1974–1983.
Jonsson J., Kaliski B, 2003. Public-key Cryptography Standards ♯1: RSA Cryptography Specifications Version 2.1. Technical Report RFC 3447. 〈http://wattle.apnic.net/ietf/rfc/PDF/rfc5208.pdf〉(accessed 15.09.15).
Jøsang, A., Ismail, R., 2002. The beta reputation system. In: Proceeding of the 15th Bled Electronic Commence Conference. pp. 1–14.
Le The Dung, Beongku An, 2015. How do forwarding schemes influence the multi-hop connectivity in cognitive radio ad-hoc networks? In: Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, pp. 805–807.
Morid, 2012, An enhanced e-commerce trust model for community based centralized systems, Electron. Commer. Res., 12, 409, 10.1007/s10660-012-9099-3
Peh, 2009, Optimization of cooperative sensing in cognitive radio networks, IEEE Trans. Veh. Tech., 58, 5294, 10.1109/TVT.2009.2028030
Pei, 2013, A sensing and etiquette reputation-based trust management for centralized cognitive radio networks, Neurocomputing, 101, 129, 10.1016/j.neucom.2012.08.005
Qin, 2009, Towards a trust-aware cognitive radio architecture, ACM SIGMOBILE Mob. Comput. Commun. Rev., 13, 86, 10.1145/1621076.1621085
Rif-Pous, 2011, Review of robust cooperative spectrum sensing techniques for cognitive radio networks, Wirel. Person. Commun., 67, 175, 10.1007/s11277-011-0372-x
Shamir, A., Identity-based cryptography. 〈http://en.wikipedia.org/wiki/ID-based_cryptography〉 (accessed 15.08.21).
Wang, 2015, A trust-based probabilistic recommendation model for social networks, J. Netw. Comput. Appl., 55, 59, 10.1016/j.jnca.2015.04.007
Yan, 2014, A survey on trust management for Internet of Things, J. Netw. Comput. Appl., 42, 120, 10.1016/j.jnca.2014.01.014
Zeng, 2014, Mitigating spectrum sensing data falsification attacks in hard-decision combining cooperative spectrum sensing, Sci. China, 57, 1
Zhu, H.J., Lin, X.D., Lu, R.X., et al., 2010. An opportunistic batch bundle authentication scheme for energy constrained DTNs. In: Proceedings of IEEE INFOCOM Conference, pp. 1–9.