FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Spectrum Sensing of Cognitive Radio – A Survey

Author(s): R. Joash Paul Timothy* and J. Christopher Clement

Publisher : FOREX Publication

Published : 30 march 2016

e-ISSN : 2347-470X

Page(s) : 20-29




R. Joash Paul Timothy*, Department of Communication Engineering School of Electronics Engineering, Vellore Institute of Technology,Vellore – 632014, Tamilnadu, India; Email: rjoashpaul@gmail.com

J. Christopher Clement , Department of Communication Engineering School of Electronics Engineering, Vellore Institute of Technology,Vellore – 632014, Tamilnadu, India; Email: christopher.clement@vit.ac.in

    [1] H Celebi, H Arslan, Utilization of location information in cognitive wireless networks, IEEE Wireless Communication. 14(4), 6–13 (2007).
    [2] J Chen, L Jiao, J Wu, X Wang, Compressive spectrum sensing in the Cognitive Radio Networks by exploiting the scarcity of active radios. WirelessNet 19(5), 661– 671 (2013).
    [3] C Chen, M Song, CS Xin, CoPD: A Conjugate prior based Detection Schemeto countermeasure Spectrum Sensing data Falsification Attacks in Cognitive Radio Networks, Wireless Net. 20(8), 2521–2528 (2014).
    [4] AW Min, KG Shin, X Hu, Attack-tolerant distributed sensing for dynamic Spectrum access networks. 17th IEEE International Conference on Network Protocols, ICNP 2009, 2009, p. 294.
    [5] Y Zhang, N Meratnia, P Havinga, Outlier detection techniques for wireless sensor networks: A survey, IEEE Communications Surveys Tutorials 12(2), 159– 170 (2010).
    [6] FastProbe: Malicious User Detection in Cognitive Radio Networks through Active Transmission Tarun Bansal, Bo Chen and Prasun Sinha.
    [7] A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks Alexandros G. Fragkiadakis, Elias Z. Tragos, Ioannis G. Askoxylakis.
    [8] A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions By Alireza Attar, Helen Tang, Athanasios V. Vasilakos, Senior Member IEEE, F. Richard Yu, Senior Member IEEE, and Victor C. M. Leung, Fellow IEEE.
    [9] A survey on security attacks and countermeasures with primary user detection in cognitive radio networks by José Marinho, Jorge Granjal, and Edmundo Monteiro.
    [10] Reputation-Based Cooperative Spectrum Sensing with Trusted Nodes Assistance by Kun Zeng, Przemysław Pawełczak, and Danijela Cabric.
    [11] Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks: Ruiliang Chen, Jung-Min Park, Y. Thomas Hou, and Jeffrey H. Reed, Virginia.
    [12] P.K. Varshney, Distributed detection and data fusion springer-Verlag.
    [13] Outlier Detection Techniques for Wireless Sensor Networks: A Survey Yang Zhang, Nirvana Meratnia, and Paul Havinga.
    [14] Trust-based Data Fusion Mechanism Design in Cognitive Radio Networks by Ji Wang, Ing-Ray Chen.
    [15] Y. Cai, L. Cui, K. Pelechrinis, P. Krishnamurthy, M. B. Weiss, and Y. Mo,“Decoupling trust and Wireless channel induced effects on collaborative Sensing attacks,” in 2014 IEEE International Symposium on DynamicSpectrum Access Networks (DYSPAN), 2014.
    [16] A Mitigation Strategy against Malicious Primary User Emulation Attack in Cognitive Radio Networks: Bilal Naqvi, Shafaq Murtaza, Baber Aslam.
    [17] Defense against Primary User Emulation Attacks in Cognitive Radio Networks: Ruiliang Chen, Jung-Min Park, and Jeffrey H. Reed.
    [18] Cognitive Radio: Making Software Radios More Personal Joseph Mitola and Gerald. q. Maguire.
    [19] Malicious User Suppression for Cooperative Spectrum Sensing in Cognitive Radio Networks using Dixon’s Outlier Detection Method: Sanket S. Kalamkar and Adrish Banerjee and Ananya Roychowdhury.

R. Joash Paul Timothy and J. Christopher Clement (2016), Spectrum Sensing of Cognitive Radio – A Survey. IJEER 4(1), 20-29. DOI: 10.37391/IJEER.040105.