참고문헌
- J. Mitola, "Cognitive Radio for Flexible Mobile Multimedia Communications," Mobile Network and Applications, Vol. 6, No. 5, pp. 435-441, 2001. https://doi.org/10.1023/A:1011426600077
- H. Kim, "Security Standard Status for Cognitive Radio Networks-focused on IEEE 802.22 WRAN," Review of KIISC, Vol, 19, No. 5, pp. 65-69, 2009.
- H. Kim, S. W. Lee, "Investigations of Security Framework for Cognitive Radio Network focused on IEEE 802.22 WRAN," Journal of Security Engineering, Vol. 6, No. 1, pp. 25-38, 2009.
- I. F. Akyildiz, W. Lee, and K. R. Chowdhury, "CRAHNs: Cognitive radio ad hoc networks," AD hoc networks, Vol. 7, pp. 810-836, 2009. https://doi.org/10.1016/j.adhoc.2009.01.001
- IEEE 802.22, IEEE P802.22/D1.0 draft standard for wireless regional area networks part 22: Cognitive wireless RAN medium access control(MAC) and physical layer(PHY) specifications: Policies and procedures for operation in the TV bands, Apr. 2008.
- J. Wang, M. S. Song, S. Santhiveeran, K. Lim, S. H. Hwang, M. Ghosh, V. Gaddam, and K. Challapali, "First Cognitive Radio Networking Standard for Personal/Portable Devices in TV White Spaces," Ecma/TC48-TG1/2009/132, white paper, 2009.
- D. Jang, H. Kim, "Security Standardization Status of Ecma-International for Personal/ Portable Devices supporting Cognitive Radio Networking," Journal of Security Engineering, Vol. 8, No. 5, pp. 553-565, 2011.
- T. C. Clancy, N. Goergen, "Security in cognitive radio networks: Threats and mitigation," Proc. of CrownCom 2008, pp. 1-8, 2008.
- R. Chen, J. Park, "Ensuring trustworth spectrum sensing in cognitive radio networks," IEEE Workshop on Networking Technologies for SDR 2006, pp. 110-119, 2006.
- H. Kim, "Design of Security Framework for Cognitive Radio Network," Proc. of 2012 Conference on Convergence/Smart/Cloud computing, pp. 23-27, 2012.
- H. Kim, "Security Aspects Analysis for Secondary User Authentication over Cognitive Radio Network," Proc. of 2013 Conference on Convergence/Smart/Cloud computing, pp. 56-59, 2014.
- H. Kim, "Analysis on Delegation-based Authentication Protocol for Wireless Roaming Service," Proc. of 2014 Conference on Convergence/Smart/Cloud computing, pp. 83-86, 2014.
- H. Kim, "Design of Adaptive Security Framework based on Carousel for Cognitive Radio Network," Journal of The Institute of Electronics Engineers of Korea, Vol. 50, No. 5, pp. 165-172, 2013. https://doi.org/10.5573/ieek.2013.50.5.165
- H. Kim, "Location-based authentication protocol for first cognitive radio networking standard," Journal of Network and Computer Applications, Vol. 34, pp. 1160-1167, 2011. https://doi.org/10.1016/j.jnca.2010.12.017
- W. B. Lee, C. K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Transactions on Wireless Communications, Vol. 4, No. 1, pp. 57-64, 2005. https://doi.org/10.1109/TWC.2004.840220
- C. Tang, D. O. Wu, "An efficient mobile authentication scheme for wireless networks," IEEE Transactions on Wireless Communications, Vol. 7, No. 4, pp. 1408-1416, 2008. https://doi.org/10.1109/TWC.2008.061080
- J. L. Tsai, N. W. Lo, T. C. Wu, "Secure Delegation-Based Authentication Protocol for Wireless Roaming Service," IEEE Communications Letters, Vol. 16, No. 7, pp. 1100-1102, 2012. https://doi.org/10.1109/LCOMM.2012.052112.120525
- BWN Lab. GeorgiaTech, http://www.ece.gatech.edu/research/labs/bwn.
- P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", Lecture Notes in Computer Science, Vol. 1666, pp. 388-397, 1999.
- F. X. Standaert, T. G. Malkin, M. Yung, "A unified framework for the analysis of side-channel key recovery attacks," Lecture Notes in Computer Science, Vol. 5479, pp. 443-461, 2009.