International audience—Primary User Emulation Attack (PUEA), in which attackers emulate primary user signals causing restriction of secondary access on the attacked channels, is a serious security problem in Cognitive Radio Networks (CRNs). An user performing a PUEA for selfishly occupying more channels is called a selfish PUEA attacker. Network managers could adopt a surveillance process on disallowed channels for identifying illegal channel occupation of selfish PUEA attackers and hence mitigating selfish PUEA. Determining surveillance strategies, particularly in multi-channel context, is necessary for ensuring network operation fairness. In this paper, we formulate a game, called multi-channel surveillance game, between the selfish attac...
Cognitive radio technology is a new revolutionary communication paradigm which allows flexible acces...
Cognitive radio as a solution of spectrum scarcity, proposes a dynamic spectrum access which imposes...
Cognitive radio (CR) signaling imposes some threats to the network. One of these common threats is c...
International audience—Primary User Emulation Attack (PUEA), in which attackers emulate primary user...
International audienceSelfish primary user emulation (PUE) is a serious security problem in cognitiv...
Malicious users (MUs) have the tendency to disrupt the activities of honest users in the network if ...
The cognitive radio network (CRN) is vulnerable to various newly-arising attacks targeting the weakn...
Cognitive Radio Networks (CRNs) are prone to emerging coexistence security threats such as Primary U...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
In this paper, we introduce a belief propagation based technique to combat the effects of primary us...
Cognitive Radio Network is an effective technology and a hot research direction which can solve the ...
In Cognitive Radio Networks (CRNs), the spectrum underlay approach enables primary and secondary net...
In this thesis, we provide mathematical formulations for and investigate a number of problems that a...
The scope of the Cognitive Radio technology is to solve the spectrum scarcity problem by allocating ...
Primary user emulation attacks are a potential security threat to cognitive radio networks. In this ...
Cognitive radio technology is a new revolutionary communication paradigm which allows flexible acces...
Cognitive radio as a solution of spectrum scarcity, proposes a dynamic spectrum access which imposes...
Cognitive radio (CR) signaling imposes some threats to the network. One of these common threats is c...
International audience—Primary User Emulation Attack (PUEA), in which attackers emulate primary user...
International audienceSelfish primary user emulation (PUE) is a serious security problem in cognitiv...
Malicious users (MUs) have the tendency to disrupt the activities of honest users in the network if ...
The cognitive radio network (CRN) is vulnerable to various newly-arising attacks targeting the weakn...
Cognitive Radio Networks (CRNs) are prone to emerging coexistence security threats such as Primary U...
Wireless communication is one of the most booming industries right now. With its expansion all over ...
In this paper, we introduce a belief propagation based technique to combat the effects of primary us...
Cognitive Radio Network is an effective technology and a hot research direction which can solve the ...
In Cognitive Radio Networks (CRNs), the spectrum underlay approach enables primary and secondary net...
In this thesis, we provide mathematical formulations for and investigate a number of problems that a...
The scope of the Cognitive Radio technology is to solve the spectrum scarcity problem by allocating ...
Primary user emulation attacks are a potential security threat to cognitive radio networks. In this ...
Cognitive radio technology is a new revolutionary communication paradigm which allows flexible acces...
Cognitive radio as a solution of spectrum scarcity, proposes a dynamic spectrum access which imposes...
Cognitive radio (CR) signaling imposes some threats to the network. One of these common threats is c...