Computer Science ›› 2018, Vol. 45 ›› Issue (10): 166-171.doi: 10.11896/j.issn.1002-137X.2018.10.031
• Information Security • Previous Articles Next Articles
WANG Lu1,2, BAI Guang-wei1, SHEN Hang1,3, WANG Tian-jing1
CLC Number:
[1]AKYILDIZ I F,LEE W Y,CHOWDHURY K R.CRAHNs:Cognitive radio ad hoc networks[J].Ad Hoc Networks,2009,7(5):810-836. [2]YOUSSEF M,IBRAHIM M,ABDELATIF M,et al.Routing metrics of cognitive radio networks:A survey[J].IEEE Communications Surveys & Tutorials,2014,16(1):92-109. [3]CESANA M,CUOMO F,EKICI E.Routing in cognitive radio networks:Challenges and solutions[J].Ad Hoc Networks,2011,9(3):228-248. [4]LIU Y,CAI L X,SHEN X S.Spectrum-aware opportunistic routing in multi-hop cognitive radio networks[J].IEEE Journal on Selected Areas in Communications,2012,30(10):1958-1968. [5]WEI Z,TANG H,YU F R.A trust based framework for both spectrum sensing and data transmission in CR-MANETs[C]∥IEEE International Conference on Communication Workshop.IEEE,2015:562-567. [6]DING L,SAVAS O,AHN G S,et al.Securing cognitive radio networks with distributed trust management against belief manipulation attacks[C]∥IEEE GLOBECOM Workshops.IEEE,2015:1-6. [7]WANG L,WANG Q,ZHANG H.Secure routing algorithm based on trust value for Ad Hoc networks[C]∥International Conference on Computer Engineering,Information Science & Application Technology.2016. [8]LIN S C,CHEN K C.Spectrum Aware Opportunistic Routing in Cognitive Radio Networks[C]∥Global Telecommunications Conference.IEEE,2010:1-6. [9]PAN X,JIANG L,HE C.Spectrum aware multi-channel opportunistic routing in cognitive radio sensor networks[C]∥International Conference on Computational and Information Sciences.IEEE Computer Society,2013:1558-1561. [10]KHASAWNEH M,AGARWAL A.A secure routing algorithm based on nodes behavior during spectrum sensing in cognitive radio networks[C]∥IEEE,International Performance Computing and Communications Conference.IEEE Computer Society,2016:1-8. [11]ZHANG G,CHEN Z,TIAN L,et al.Using trust to establish a secure routing model in cognitive radio network[J].Plos One,2015,10(9):e0139326. [12]CUI C,MAN H,WANG Y,et al.Optimal cooperative spectrum aware opportunistic routing in cognitive radio Ad Hoc networks[J].Wireless Personal Communications,2016,91(1):101-118. [13]AKYILDIZ I F,LO B F,BALAKRISHNAN R.Cooperative spectrum sensing in cognitive radio networks:A survey[J].Physical Communication,2011,4(1):40-62. [14]REN J,ZHANG Y,ZHANG N,et al.Dynamic channel access to improve energy efficiency in cognitive radio sensor networks[J].IEEE Transactions on Wireless Communications,2016,15(5):3143-3156. [15]DROMARD J,KHATOUN R,KHOUKHI L.A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network[C]∥International Conference on Te-lecommunications.IEEE,2013:1-5. [16]MARCHANG N,DATTA R.Light-weight trust-based routing protocol for mobile ad hoc networks[J].Iet Information Security,2012,6(2):77-83. [17]YADAV R,MANE A.LASAR:Spectrum aware routing protocol for cognitive radio wireless networks[C]∥International Conference on Communication,Information & Computing Technology.IEEE,2015:1-6. |
[1] | FANG Ting, GONG Ao-yu, ZHANG Fan, LIN Yan, JIA Lin-qiong, ZHANG Yi-jin. Dynamic Broadcasting Strategy in Cognitive Radio Networks Under Delivery Deadline [J]. Computer Science, 2021, 48(7): 340-346. |
[2] | CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497. |
[3] | DING Shi-ming, WANG Tian-jing, SHEN Hang, BAI Guang-wei. Energy Classifier Based Cooperative Spectrum Sensing Algorithm for Anti-SSDF Attack [J]. Computer Science, 2021, 48(2): 282-288. |
[4] | TIAN Miao-miao, WANG Zu-lin, XU Mai. DVB-S2 Signal Receiving and Analysis Based on Cognitive Radio [J]. Computer Science, 2020, 47(4): 226-232. |
[5] | SU Fan-jun,DU Ke-yi. Trust Based Energy Efficient Opportunistic Routing Algorithm in Wireless Sensor Networks [J]. Computer Science, 2020, 47(2): 300-305. |
[6] | XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149. |
[7] | WANG Chen-yang, LIN Hui. Three-dimensional Geographic Opportunistic Routing Based on Energy Harvesting Wireless Sensor Networks [J]. Computer Science, 2019, 46(6A): 305-308. |
[8] | ZHANG Yu-pei, ZHAO Zhi-jin, ZHENG Shi-lian. Cognitive Decision Engine of Hybrid Learning Differential Evolution and Particle Swarm Optimization [J]. Computer Science, 2019, 46(6): 95-101. |
[9] | JI Yi, JIA Jun-cheng, SHENG Kai. Time Slot Optimization for Channel Hopping in CRN [J]. Computer Science, 2019, 46(11): 58-64. |
[10] | ZHAO Peng, WU Li-fa, HONG Zheng. Research on Broker Based Multicloud Access Control Model [J]. Computer Science, 2019, 46(11): 123-129. |
[11] | GAO Peng, LIU Yun-jiang, GAO Wei-ting, LI Man, CHEN Juan. Double Thresholds DMM Cooperative Spectrum Sensing Algorithm Based on Credibility [J]. Computer Science, 2018, 45(9): 166-170. |
[12] | CAO Kai-tian, HANG Yi-ling. Novel Energy Detection Method and Detection Performance Analysis [J]. Computer Science, 2018, 45(6A): 266-269. |
[13] | ZHUANG Ling and YIN Yao-hu. Resource Allocation Algorithm for Cognitive Heterogeneous Networks Based on Imperfect Spectrum Sensing [J]. Computer Science, 2018, 45(5): 49-53. |
[14] | HAN Li and QIAN Huan-yan. Opportunistic Routing Algorithm Combining Intra-session Coding and Inter-session Coding in Wireless Network [J]. Computer Science, 2018, 45(5): 69-74. |
[15] | XU Wen-hao, SHEN Hang and BAI Guang-wei. Link Burstiness-aware Opportunistic Routing Protocol in Wireless Networks [J]. Computer Science, 2018, 45(5): 83-88. |
|