Trust Based Security for Cognitive Radio Networks
With the rapid increase of wireless applications, Cognitive Radio (CR) has been considered as a promising concept to improve the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Because of the dynamic behavior of Cognitive Radio Networks (CRNs)...
| Main Authors: | Parvin, Sazia, Han, Song, Hussain, Farookh Khadeer, Al Faruque, M. |
|---|---|
| Other Authors: | Gabriele Kotsis |
| Format: | Conference Paper |
| Published: |
ACM
2010
|
| Subjects: | |
| Online Access: | http://doi.acm.org/10.1145/1967486.1967605 http://hdl.handle.net/20.500.11937/15015 |
Similar Items
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Trust-based Throughput in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Authenticated spectrum sharing for secondary users in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Comparative analysis of trust and security
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Exploring personalised autonomous vehicles to influence user trust
by: Sun, Xu, et al.
Published: (2020)
by: Sun, Xu, et al.
Published: (2020)
Trust-based mechanisms for secure communication in cognitive radio networks
by: Parvin, Sazia
Published: (2013)
by: Parvin, Sazia
Published: (2013)
A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing
by: Barakat, Hussein Mohammed
Published: (2016)
by: Barakat, Hussein Mohammed
Published: (2016)
Efficient blind rendezvous schemes for cognitive radio ad-hoc networks
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Domesticating home networks
by: Brown, Anthony
Published: (2016)
by: Brown, Anthony
Published: (2016)
Dynamic approaches for spectrum control in cognitive radio networks
by: Mohamedou, Ahmed
Published: (2015)
by: Mohamedou, Ahmed
Published: (2015)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Opportunistic cognitive radio network with primary user activity model
by: Mohamad, Mas Haslinda
Published: (2019)
by: Mohamad, Mas Haslinda
Published: (2019)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications
by: Raza, Muhammad, et al.
Published: (2011)
by: Raza, Muhammad, et al.
Published: (2011)
Fuzzy nature and dynamic trust modeling in service oriented environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
The Fuzzy and Dynamic Nature of Trust
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
A trust-based bio-inspired approach for credit lending decisions
by: Mirtalaei, M., et al.
Published: (2012)
by: Mirtalaei, M., et al.
Published: (2012)
Adapting individual Cognitive Stimulation Therapy (iCST) for delivery by a touch-screen application for people with dementia
by: Rai, Harleen Kaur
Published: (2021)
by: Rai, Harleen Kaur
Published: (2021)
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
by: Salman, Emad Hmood
Published: (2018)
by: Salman, Emad Hmood
Published: (2018)
Exploring childhood adversity, impulsivity, and cognitive functioning within forensic populations
by: Johnson, Oliver
Published: (2025)
by: Johnson, Oliver
Published: (2025)
User recommendation algorithm in social tagging system based on user trust method
by: Wong, Pei Voon
Published: (2012)
by: Wong, Pei Voon
Published: (2012)
On the technical challenges of cognitive radio in TV white spaces
by: Lodro, Mir Muhammad
Published: (2015)
by: Lodro, Mir Muhammad
Published: (2015)
Involving older people in research: practical considerations when using the authenticity criteria in constructivist inquiry
by: Brown Wilson, Christine, et al.
Published: (2011)
by: Brown Wilson, Christine, et al.
Published: (2011)
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
by: Ramzi, Nurul Syazwani
Published: (2017)
by: Ramzi, Nurul Syazwani
Published: (2017)
Interactive 3D house marketing / Abu Bakar Mohamed
by: Mohamed, Abu Bakar
Published: (2004)
by: Mohamed, Abu Bakar
Published: (2004)
Design of a web-based LBS framework addressing usability, cost, and implementation constraints
by: Delfos, Jacob, et al.
Published: (2010)
by: Delfos, Jacob, et al.
Published: (2010)
Mobile road safety learning apps for children using digital comic and multimedia approach / Muhammad Fazli Mihsah Mohd Fazilah
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
Merekod markah menggunakan kod QR ke dalam sistem pendaftaran kokurikulum (marks recorded in co-curricular registration system using QR code) / Teh Faradilla Abdul Rahman dan Zamri Abu Bakar
by: Abdul Rahman, Teh Faradilla, et al.
Published: (2019)
by: Abdul Rahman, Teh Faradilla, et al.
Published: (2019)
IM-Vative sandbox: fun learning in mastering
hypertext markup language (HTML) / Izzatil Husna Arshad ...[et al.]
by: Arshad, Izzatil Husna, et al.
Published: (2020)
by: Arshad, Izzatil Husna, et al.
Published: (2020)
The cognitive styles of satisfied decision support systems users: An hypothesis
by: Williams, Robert
Published: (1999)
by: Williams, Robert
Published: (1999)
Malaysian Female Pre-Service Teachers Online: Exploring Their Internet Use And Attitudes
by: Wong, Su Luan, et al.
Published: (2005)
by: Wong, Su Luan, et al.
Published: (2005)
Building a fuzzy trust network in unsupervised multi-agent environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Similar Items
-
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011) -
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012) -
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)