Theoretical thesis.Bibliography: pages 71-74.1. Introduction -- 2. Cognitive Radio technology -- Cognitive Radio security -- 4. PUEA mitigation algorithms -- 5. A new belief propagation based PUEA mitigation algorithm -- 6. Conclusion.Cognitive Radio (CR) is a promising technology that has the potential torevolutionize spectrum utilization by enabling unlicensed users (secondary users) to seek opportunities for transmission by taking advantage of the idle periods of licensed users (primary users) [1]. However, participants in the CR network can comprise of malicious adversaries who adopt dishonest and non-cooperative strategies to attack the network. An attack called the Primary user emulation attack has been identified as the most serious ...
Cognitive Radio Networks (CRNs) are prone to emerging coexistence security threats such as Primary U...
Cognitive radio (CR), which provides dynamic spectrum access to combat spectrum scarcity, imposes so...
This paper presents the results of the characterization of the attack known as the "primary user emu...
In this paper, we introduce a belief propagation based technique to combat the effects of primary us...
This paper presents a method to alleviate the effects of primary user emulation attacks in cognitive...
Cognitive radio (CR) is a promising technology for future wireless spectrum allocation to improve th...
Empirical thesis.Bibliography: pages 145-154.1. Introduction -- 2. Cognitive radio networks -- 3. Se...
Primary user emulation attacks are a potential security threat to cognitive radio networks. In this ...
Cognitive Radio Networks (CR) is an advanced growing technique and a promising technology for the up...
Cognitive Radio Networks (CR) is an advanced growing technique and a promising technology for the up...
M. Sc. Eng. University of KwaZulu-Natal, Durban 2014.The rapid progress in the number of users and a...
Cognitive Radio Network is an effective technology and a hot research direction which can solve the ...
Abstract — In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognit...
Theoretical thesis.Bibliography: pages 45-50.1. Introduction -- 2. Background -- 3. Literature revie...
Security is the prominent problem in emerging cognitive radio. Protecting the chief user’s and sub-o...
Cognitive Radio Networks (CRNs) are prone to emerging coexistence security threats such as Primary U...
Cognitive radio (CR), which provides dynamic spectrum access to combat spectrum scarcity, imposes so...
This paper presents the results of the characterization of the attack known as the "primary user emu...
In this paper, we introduce a belief propagation based technique to combat the effects of primary us...
This paper presents a method to alleviate the effects of primary user emulation attacks in cognitive...
Cognitive radio (CR) is a promising technology for future wireless spectrum allocation to improve th...
Empirical thesis.Bibliography: pages 145-154.1. Introduction -- 2. Cognitive radio networks -- 3. Se...
Primary user emulation attacks are a potential security threat to cognitive radio networks. In this ...
Cognitive Radio Networks (CR) is an advanced growing technique and a promising technology for the up...
Cognitive Radio Networks (CR) is an advanced growing technique and a promising technology for the up...
M. Sc. Eng. University of KwaZulu-Natal, Durban 2014.The rapid progress in the number of users and a...
Cognitive Radio Network is an effective technology and a hot research direction which can solve the ...
Abstract — In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognit...
Theoretical thesis.Bibliography: pages 45-50.1. Introduction -- 2. Background -- 3. Literature revie...
Security is the prominent problem in emerging cognitive radio. Protecting the chief user’s and sub-o...
Cognitive Radio Networks (CRNs) are prone to emerging coexistence security threats such as Primary U...
Cognitive radio (CR), which provides dynamic spectrum access to combat spectrum scarcity, imposes so...
This paper presents the results of the characterization of the attack known as the "primary user emu...