2015
DOI: 10.1016/j.jnca.2015.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Neighbor discovery in traditional wireless networks and cognitive radio networks: Basics, taxonomy, challenges and future research directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 81 publications
0
12
0
Order By: Relevance
“…Combining four routing mechanisms in mobile ad hoc networks. In addition, some researchers have introduced neighbor discovery into multi-directional antenna environment [26,27], multi-user environment [28], and cognitive network environment [29].…”
Section: Related Workmentioning
confidence: 99%
“…Combining four routing mechanisms in mobile ad hoc networks. In addition, some researchers have introduced neighbor discovery into multi-directional antenna environment [26,27], multi-user environment [28], and cognitive network environment [29].…”
Section: Related Workmentioning
confidence: 99%
“…In traditional single-channel or multi-channel wireless networks, neighbor discovery is a problem that has been extensively studied under a variety of different models (w.r.t., e.g., synchrony and availability of collision detection). Interested readers can, e.g., refer to the survey paper from Khan et al [9], and from Chen et al [2], for more details. On the contrary, for cognitive radio networks, limited focus has been put on this problem.…”
Section: Related Workmentioning
confidence: 99%
“…On the contrary, for cognitive radio networks, limited focus has been put on this problem. (See related parts in [9] for a survey.) We are only able to identify one work from Zeng et al [25] 2 that explicitly targets this issue and provides theoretical results.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it seems very realistic to assume that those nodes which are in the direct radio communication range (one hop nodes) of each other already share a secret symmetric key. This can easily be accomplished during the secure neighbor discovery phase (Khan et al, 2015;Poturalski et al, 2013;Taheri et al, 2016). After the initial deployment phase, various available routes are established between communicating nodes and routing tables as usual are kept on being updated according to the underlying routing protocol.…”
Section: The Attack Modelmentioning
confidence: 99%