[1] J. Mitola III, G. Q. Maguire, “Cognitive radio: making software radios more personal,” IEEE
Pers. Commun., Vol. 6, pp. 13-18, Aug. 1999.
[2] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Selected Areas in Communications, Vol. 23, pp. 201–220, Feb. 2005.
[3] I. F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Computer Networks, pp. 2127–2159, 2006.
[4] S. Mishra, A. Sahai, and R. Brodersen, “Cooperative sensing among cognitive radios,” in Proc. IEEE Int. Conf. Commun, Vol. 2, pp. 1658–1663, May 2006.
[5] I. F. Akyildiz, B. F. Lo, R. Balakrishnan, “Cooperative spectrum sensing in cognitive radio networks: A survey,” Physical Communication, Vol. 4, pp. 40-62, 2011.
[6] G. Ganesan, Y. Li, “Cooperative spectrum sensing in cognitive radio, part I: two user networks,” IEEE Transactions on wireless communications, Vol. 6, pp. 2204-2212, 2007.
[7] G. Ganesan, Y. Li, “Cooperative spectrum sensing in cognitive radio, part II: multiuser networks,” IEEE Transactions on wireless communications, Vol. 6, pp. 2214-2222, 2007.
[8] A. Ghasemi, E. S. Sousa, “Collaborative spectrum sensing for opportunistic access in fading environments,” In Proceedings of the 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Vol. 2, pp. 131-136, 2005.
[9] A. Ghasemi and E. S. Sousa, “Opportunistic spectrum access in fading channels through collaborative sensing,” Journal Commun, Vol. 2, pp. 71-82, 2007.
[10] R. Chen, J. M. Park, Y. T. Hou, J. H. Reed, “Toward secure distributed spectrum sensing in cognitive radio networks,” IEEE Communications Magazine, Vol. 46, pp. 50-55, 2008.
[11] V. Chen, M. Song, C. Xin, “CoPD: a conjugate prior based detection scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks,” Wireless Networks, Vol. 20, pp. 2521-2528, 2014.
[12] C. H. Hyder, B. Grebur, L. Xiao, M. Ellison, “ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks,” IEEE Transactions on mobile computing, Vol. 13, pp. 1707-1719, 2014.
[13] A. S. Rawat, P. Anand, H. Chen, P. K. Varshney, “Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks,” IEEE Transactions on Signal Processing, Vol. 59, pp. 774-786, 2011.
[14] R. Chen, J. Park, K. Bian, “Robust distributed spectrum sensing in cognitive radio networks,” INFOCOM 2008. IEEE 27th Conference on Computer Communications, pp. 1876–1884, 2008.
0204060801001201401600.950.9550.960.9650.970.9750.980.9850.990.9951Number of Attackers (Na)Correct Sensing Ratio (Qc) WSPRTProposed (DWSPRT)02040608010012014016033.544.555.56Number of Attackers (Na)Number of Samples WSPRTProposed (DWSPRT)
Majlesi Journal of Electrical Engineering Vol. 9, No. 2, June 2015
66
[15] R. Chen, J-M. J. Park and K. Bian, “Robustness against Byzantine failures in distributed spectrum sensing,” Computer Communication, Vol. 35, pp. 2115-2124, 2012.
[16] C. Y. Chen, Y. H. Chou, H. C. Chao and C. H. Lo, “Secure centralized spectrum sensing for cognitive radio networks,” Wireless Networks, Vol. 18, pp. 667-677, 2012.
[17] H. Urkowitz, “Energy detection of unknown deterministic signals,” In Proceedings of the IEEE, Vol. 55, pp. 523- 531, 1967.
[18] F. F. Digham, M. S. Alouini, M. K. Simon, “On the energy detection of unknown signals over fading channels,” IEEE Transaction on Communications, Vol. 55, pp. 21-24, 2007.
[19] C. Bettstetter, G. Resta, P. Santi, “The node distribution of the random waypoint mobility model for wireless ad hoc networks,” IEEE Trans. Mobile Comput, Vol. 2, 2003.
[20] T. S. Rappaport, “Wireless Communications: Principle and Practice,” Prentice Hall, 1996.
[21] P. K. Varshney, “Distributed Detection and Data Fusion,” Springer-Verlag, New York, 1997