1 |
IEEE 802.22, "Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications: Policies and Procedures for Operation in the TV Bands," IEEE P802.22-D1.0, 2008.
|
2 |
T. Brown and A. Sethi, "Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment," Proc. of CrownCom 2008, pp. 456-464, May 2008.
|
3 |
고광진, 박창현, 송명선, 엄중선, 유성진, 임선민, 정회윤, 황성현, "TV White Spaces에서의 CR 기술 동향," 전자통신동향분석, 24(3), pp. 91-102, 2009년 6월.
|
4 |
R. Chen, J. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on selected areas in communications, vol. 26, no. 7, pp. 25-37, Jan. 2008.
DOI
|
5 |
R. Nomura, M. Kuroda, and D. Inoue, "Location-based Key Management for Ubiquitous Wireless Network," IWS 2005/WPMC'05, pp. 51-55, Sep. 2005.
|
6 |
J. Mitola and G. Maguire, "Cognitive radio: Making software radios more personal," IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.
DOI
ScienceOn
|
7 |
IEEE 802 ECSG on WS, "Security Tutorial," IEEE 802ECSGonWS-09/ 0045r01, 2009.
|
8 |
D. Wright, S. Gutwirth, M. Friedewald, P.D. Hert, M. Langheinrich, and A. Moscibroda, "Privacy, trust and policy-making:Challenges and responses," Computer Law & Security Report, vol. 25, no. 1, pp. 69-83, 2009.
DOI
ScienceOn
|
9 |
J. Mitola, "Cognitive radio for flexible mobile multimedia communications," Proc. of IEEE Workshop on Mobile Multimedia Comm., pp. 3-10, 1999.
|
10 |
J.L. Burbank, "Security in cognitive radio networks : the required evolution in approaches to wireless network security," Proc. of CrownCom 2008, pp. 1-7, May 2008.
|
11 |
M. Kuroda, R. Nomura, and W. Trappe, "A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios," Proc. of SECON'07, pp. 70-79, June 2007.
|
12 |
D. Stanley, J. Walker, and B. Aboba, "EAP Method Requirements for Wireless LANs," RFC 4017, Mar. 2005.
|
13 |
FCC, ET Docket No. 08-260, Second Report and Order and Memorandum Opinion and Order, Nov. 2008.
|
14 |
T.C. Clancy and N. Goergen, "Security in cognitive radio networks : threats and mitigation," Proc. of CrownCom 2008, pp. 1-8, May 2008.
|
15 |
IEEE 802.22, "Recommended Text for Security in 802.22," IEEE 802.22-08/0174r17, 2009.
|