Citation: | FENG Guangsheng, LIN Junyu, ZHAO Qian, et al., “A Differential Game Based Approach Against Objective Function Attack in Cognitive Networks,” Chinese Journal of Electronics, vol. 27, no. 4, pp. 879-888, 2018, doi: 10.1049/cje.2017.08.006 |
R.W. Thomas, D.H. Friend, L.A. Dasilva, et al., "Cognitive networks:adaptation and learning to achieve end-to-end performance objectives", IEEE Communications Magazine, Vol.44, No.12, pp.51-57, 2006.
|
H. ElSawy, H. Dahrouj, T.Y. Al-Naffouri, et al., "Virtualized cognitive network architecture for 5G cellular networks", IEEE Communications Magazine, Vol.53, No.7, pp.78-85, 2015.
|
A.H. Sakr and E. Hossain, "Cognitive and energy harvestingbased D2D communication in cellular networks:stochastic geometry modeling and analysis", IEEE Transactions on Communications, Vol.63, No.5, pp.1867-1880, 2015.
|
F.H. Tseng, L.D. Chou, H.C. Chao, et al., "Ultra-dense small cell planning using cognitive radio network toward 5G", IEEE Wireless Communications, Vol.22, No.6, pp.76-83, 2015.
|
C. Fortuna and M. Mohorcic, "Trends in the development of communication networks:Cognitive networks", Computer Networks, Vol.53, No.9, pp.1354-1376, 2009.
|
L.T. Tan and L.B. Le, "Design and optimal configuration of fullduplex MAC protocol for cognitive radio networks considering self-interference", IEEE Access, No.3, pp.2715-2729, 2015.
|
O. Lé on, J. Hernandez-Serrano and Soriano M, "A new crosslayer attack to TCP in cognitive radio networks", Proc. of IEEE Second International Workshop on Cross Layer Design, Palma de Mallorca, Spain, pp.1-5, 2009.
|
Q. Pei, H. Li, J. Ma, et al., "Defense against objective function attacks in cognitive radio networks", Chinese Journal of Electronics, Vol.20, No.4, pp.138-142, 2011.
|
S. Parvin, F.K. Hussain, O.K. Hussain, et al., "Cognitive radio network security:A survey", Journal of Network and Computer Applications, Vol.35, No.6, pp.691-1708, 2012.
|
Y. Reddy, "Security Issues and Threats in Cognitive Radio Networks", Proc. of the Ninth Advanced International Conference on Telecommunications, Bangkok, Thailand, pp.84-89, 2013.
|
J. Li, Z. Feng, P. Zhang, et al., "A survey of security issues in cognitive radio networks", China Communications, Vol.12, No.3, pp.132-150, 2015.
|
T.C. Clancy and N. Goergen, "Security in cognitive radio networks:Threats and mitigation", Prof of the 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, Singapore, pp.1-8, 2008.
|
O. Lé on, J. Hernández-Serrano and M. Soriano, "Securing cognitive radio networks", International journal of communication systems, Vol.23, No.5, pp.633-652, 2010.
|
S. Anand, Z. Jin and K. Subbalakshmi, "An analytical model for primary user emulation attacks in cognitive radio networks", Proc. of the 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, Chicago, USA, pp.1-6, 2008.
|
A. Alahmadi, M. Abdelhakim and J. Ren, "Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard", IEEE Transactions on Information Forensics and Security, Vol.9, No.5, pp.772-781, 2014.
|
B. Wang, Y. Wu, K. Liu, et al., "An anti-jamming stochastic game for cognitive radio networks", IEEE Journal on Selected Areas in Communications, Vol.29, No.4, pp.877-899, 2011.
|
F. Yu, H. Tang, M. Huang, et al., "Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios", Proc. of the 2009 IEEE Military Communications Conference, Boston, USA, pp.1-7, 2009.
|
R. Chen, J.M. Park and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks", Proc. of the INFOCOM 2008, Phoenix, USA, pp.1876-1884, 2008.
|
D. Hlavacek and J.M. Chang, "A layered approach to cognitive radio network security:A survey", Computer Networks, No.75, pp.414-436, 2014.
|
R.K. Sharma and D.B. Rawat, "Advances on security threats and countermeasures for cognitive radio networks:A survey", IEEE Communications Surveys & Tutorials, Vol.17, No.2, pp.1023-1043, 2015.
|
Z. Shu, Y. Qian and S. Ci, "On physical layer security for cognitive radio networks", IEEE Network, Vol.27, No.3, pp.28-33, 2013.
|
L. Ding, O. Savas and G.S. Ahn, "Securing cognitive radio networks with distributed trust management against belief manipulation attacks", Proc. of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, pp.1-6, 2015.
|
S. Senthilkumar and C.G. Priya, "A review of channel estimation and security techniques for CRNS", Automatic Control and Computer Sciences, Vol.50, No.3, pp. 187-210, 2016.
|
X. Liao, D. Hao and K. Sakurai, "Classification on attacks in wireless ad hoc networks:A game theoretic view", Proc. of the 20117th International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, pp.144-149, 2011.
|
M. Liu and I. Traore, Empirical relation between coupling and attack ability in software systems:a case study on DOS, Proc. of the 2006 workshop on Programming languages and analysis for security, Ottawa, Canada, pp.57-64, 2006.
|