Learn More
Cognitive radio network is composed of many cognitive users with sensing and learning modules, and its spectrum allocation changes from the primary user exclusive the resource to both users sharing the licensed spectrum. Trustworthy data of the perception and learning is the most important precondition whether the decision-making is fair and accurate. In(More)
Cognitive radio (CR) is a novel technology that promises to improve spectrum efficiency by allowing secondary users (SUs) to dynamically access spectrum without using by primary users. With offering great flexibility and software reconfigurability, unsecured CR can be easily manipulated to attack legacy users on both control and data channels. In this(More)
In recent years, Cognitive Radio (CR) has been regarded as the most promising technique for solving the problem of spectrum utilization. CR can scan the spectrum band and identify free channels which will be used by cognitive users with no harm to primary users. Due to the various dynamic characteristics of Cognitive Radio Networks (CRN), adaptation and(More)
With the existing Cognitive Radio Networks development, we present a sub-spectrum sensing scheme based on reputation, which takes advantage in energy consumption, security and fairness from spectrum sensing, data fusion and spectrum allocation by classifying users and spectrum bands reasonably. The analysis shows that the sub-spectrum sensing scheme can(More)
It has been proved that Asymmetric cryptography can be used in Wireless Sensor Networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery process are trusted nodes. Digital signatures based on ECC is used in our protocol, therefore, our protocol has many virtues, such as less(More)
In distributed cognitive radio network (CRN), it is always not available to collect the sensing results from all cognitive users due to the lack of a common fusion center, which makes it critical to keep consistency and reliability of the spectrum sensing results. For consensus-based sensing algorithm, a security and connectivity analysis is implemented.(More)
In database-driven cognitive radio networks, location inference attack may cause location privacy leakage of secondary users. Malicious entities could geo-locate secondary users with spectrum utilization information. The efficiency of existing solution largely depends on the stability of available spectrum. Most solutions are not effective because of the(More)