A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components

G Baldini, G Steri - IEEE Communications Surveys & Tutorials, 2017 - ieeexplore.ieee.org
In recent years, several research studies have investigated the identification of electronic
devices through their physical components and properties, both from a theoretical point of …

Wireless physical-layer identification: Modeling and validation

W Wang, Z Sun, S Piao, B Zhu… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the
physical waveforms of wireless signals to identify and classify authorized devices. As the …

Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey

F Salahdine, N Kaabouch - Physical Communication, 2020 - Elsevier
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …

Proximity-based security techniques for mobile users in wireless networks

L Xiao, Q Yan, W Lou, G Chen… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we propose a privacy-preserving proximity-based security system for location-
based services in wireless networks, without requiring any pre-shared secret, trusted …

Mobile collaborative spectrum sensing for heterogeneous networks: A Bayesian machine learning approach

Y Xu, P Cheng, Z Chen, Y Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Spectrum sensing in a large-scale heterogeneous network is very challenging as it usually
requires a large number of static secondary users (SUs) to obtain the global spectrum states …

Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking

ME Ahmed, H Kim, M Park - MILCOM 2017-2017 IEEE Military …, 2017 - ieeexplore.ieee.org
Securing Internet of Things is a challenge because of its multiple points of vulnerability. In
particular, Distributed Denial of Service (DDoS) attacks on IoT devices pose a major security …

Primary user emulation attack mitigation using neural network

V Ponnusamy, K Kottursamy, T Karthick… - Computers & Electrical …, 2020 - Elsevier
The spectrum sensing scheme suffers from a physical layer attack of Primary User Emulation
Attack (PUEA). The resolution is to mitigate the cognitive radio user from the PUEA under the …

Deep learning meets wireless network optimization: Identify critical links

L Liu, B Yin, S Zhang, X Cao… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the superior capability of discovering intricate structure of large data sets, deep learning
has been widely applied in various areas including wireless networking. While existing deep …

A survey on security issues in cognitive radio based cooperative sensing

S Shrivastava, A Rajesh, PK Bora, B Chen… - IET …, 2021 - Wiley Online Library
Cognitive radio based cooperative spectrum sensing (CSS) is severely affected when some
secondary users maliciously attack it. Two attacks regarded as key adversaries to the …

Primary user emulation and jamming attack detection in cognitive radio via sparse coding

HM Furqan, MA Aygül, M Nazzal, H Arslan - EURASIP Journal on Wireless …, 2020 - Springer
Cognitive radio is an intelligent and adaptive radio that improves the utilization of the
spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user …