Proceedings of the 2011 IEEE National Aerospace and Electronics Conference (NAECON) 2011
DOI: 10.1109/naecon.2011.6183125
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive radio network as wireless sensor network (II): Security consideration

Abstract: This is the second paper in a series of using cognitive radio network as wireless sensor network. The motivation of the paper is to push the convergence of radar and communication systems into a unified cognitive network. This paper studies this vision from a secure point of view. We propose two methods for robust spectrum sensing in the same framework of cognitive radio network. The first method is based on robust principal component analysis (PCA), to separate spectrum sensing results into the low rank signa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 14 publications
0
15
0
Order By: Relevance
“…In summary, the work in this paper generalizes those in [7], [8], by incorporating inaccurate location measurements, noisy sensor reports, and time-varying PU and malicious user activity. As with earlier approaches, the work in this paper can always be combined with a trust-based reputation management system that can track and black-list malicious SUs [16].…”
Section: A Related Workmentioning
confidence: 93%
See 2 more Smart Citations
“…In summary, the work in this paper generalizes those in [7], [8], by incorporating inaccurate location measurements, noisy sensor reports, and time-varying PU and malicious user activity. As with earlier approaches, the work in this paper can always be combined with a trust-based reputation management system that can track and black-list malicious SUs [16].…”
Section: A Related Workmentioning
confidence: 93%
“…A unified approach presented in [8] combines similar ideas and performs joint spectrum sensing and outlier identification by exploiting network topology, node locations, and signal propagation characteristics. Further extensions of this idea are provided in [7], where a robust version of principal component analysis (PCA) is utilized to jointly estimate the PU powers and outlier locations.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The following research work addresses the active PUEA. In [23], a robust technique for spectrum sensing process is proposed based on the principal component analysis to find any attack targeting the network. A detection method of PUEA is proposed in [24].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, CR provides a resolution to spectrum inefficiency and the shortage on these bands by allowing CR users (secondary users (SUs)) to opportunistically access vacant spectrum space [6]. This results in providing great opportunities for a rising number of SUs to use these bands through an optimised approach for utilising radio resources [7][8].…”
Section: Introductionmentioning
confidence: 99%