Learn More
Cognitive radio network is composed of many cognitive users with sensing and learning modules, and its spectrum allocation changes from the primary user exclusive the resource to both users sharing the licensed spectrum. Trustworthy data of the perception and learning is the most important precondition whether the decision-making is fair and accurate. In(More)
In recent years, Cognitive Radio (CR) has been regarded as the most promising technique for solving the problem of spectrum utilization. CR can scan the spectrum band and identify free channels which will be used by cognitive users with no harm to primary users. Due to the various dynamic characteristics of Cognitive Radio Networks (CRN), adaptation and(More)
Cognitive radio (CR) is a novel technology that promises to improve spectrum efficiency by allowing secondary users (SUs) to dynamically access spectrum without using by primary users. With offering great flexibility and software reconfigurability, unsecured CR can be easily manipulated to attack legacy users on both control and data channels. In this(More)
It has been proved that Asymmetric cryptography can be used in Wireless Sensor Networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery process are trusted nodes. Digital signatures based on ECC is used in our protocol, therefore, our protocol has many virtues, such as less(More)
With the existing Cognitive Radio Networks development, we present a sub-spectrum sensing scheme based on reputation, which takes advantage in energy consumption, security and fairness from spectrum sensing, data fusion and spectrum allocation by classifying users and spectrum bands reasonably. The analysis shows that the sub-spectrum sensing scheme can(More)
—In database-driven cognitive radio networks, location inference attack may cause location privacy leakage of secondary users. Malicious entities could geo-locate secondary users with spectrum utilization information. The efficiency of existing solution largely depends on the stability of available spectrum. Most solutions are not effective because of the(More)