Cognitive radios: A survey on spectrum sensing, security and spectrum handoff

V Ramani, SK Sharma - China Communications, 2017 - ieeexplore.ieee.org
Pervasive wireless computing and communication have created an ever-increasing demand
for more radio spectrum. Since, most of the spectrum is underutilized, it motivated the …

ARC: Adaptive reputation based clustering against spectrum sensing data falsification attacks

CS Hyder, B Grebur, L Xiao… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
IEEE 802.22 is the first standard based on the concept of cognitive radio. It recommends
collaborative spectrum sensing to avoid the unreliability of individual spectrum sensing …

Detection of stealthy jamming for UAV-assisted wireless communications: An HMM-based method

C Zhang, L Zhang, T Mao, Z Xiao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Due to the high mobility, low cost and high robustness of line-of-sight (LoS) channels,
unmanned aerial vehicles (UAVs) have begun to play an important role in assisting wireless …

Spectrum sharing security and attacks in CRNs: A review

W Alhakami, A Mansour, GA Safdar - 2014 - uobrep.openrepository.com
Cognitive Radio plays a major part in communication technology by resolving the shortage
of the spectrum through usage of dynamic spectrum access and artificial intelligence …

CR-Honeynet: A cognitive radio learning and decoy-based sustenance mechanism to avoid intelligent jammer

S Bhunia, E Miles, S Sengupta… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cognitive radio network (CRN) enables secondary users to borrow unused spectrum from
the proprietary users in a dynamic and opportunistic manner. However, dynamic and open …

Abnormal Communication Signals Recognition Based on Image Enhancement and Improved Memory‐Augmented Autoencoder

T Kuang, B Zhou, J Li, G Ding… - … and Mobile Computing, 2022 - Wiley Online Library
Detecting increasing anomalous signals is critical to effective spectrum management due to
the complexity of the use of electromagnetic spectrum. The anomaly recognition approach …

Quickest detection of denial-of-service attacks in cognitive wireless networks

CL Sorrells, L Qian, H Li - 2012 IEEE Conference on …, 2012 - ieeexplore.ieee.org
Many denial-of-service (DOS) attacks in wireless networks, such as jamming, will cause
significant performance degradation to the network and thus need to be detected quickly …

Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks

Y Jararweh, HA Bany Salameh, A Alturani… - Telecommunication …, 2018 - Springer
Several new attacks have been identified in CRNs such as primary user emulation, dynamic
spectrum access (DSA), and jamming attacks. Such types of attacks can severely impact …

Adaptive beam nulling in multihop ad hoc networks against a jammer in motion

S Bhunia, V Behzadan, PA Regis, S Sengupta - Computer Networks, 2016 - Elsevier
In multihop ad hoc networks, a jammer can drastically disrupt the flow of information by
intentionally interfering with links between a subset of nodes. The impact of such attacks can …

Cr-honeynet: A learning & decoy based sustenance mechanism against jamming attack in crn

S Bhunia, S Sengupta… - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
Cognitive Radio Network (CRN) enables secondary users to borrow unused spectrum from
the proprietary users in a dynamic and opportunistic manner. However, dynamic and open …