Mitola J, Maguire J G Q. Cognitive radio: making software radios more personal[J]. Personal Communications, IEEE, 1999, 6(4): 13-18.
[2]
周小飞, 张宏纲. 认知无线电原理及应用[M]. 北京: 北京邮电大学出版社, 2007.
[3]
申滨, 王舒, 黄琼, 等. 认知无线电最优用户选择协作频谱感知[J]. 北京邮电大学学报, 2014, 37(2): 32-37. Shen Bin, Wang Shu, Huang Qiong, et al. Cognitive radio users to choose the optimal cooperative spectrum sensing[J]. Journal of Beijing University of Posts and Telecommunications, 2014, 37(2): 32-37.
[4]
Feng Jingyu, Zhang Yuqing, Lu Guangyue, et al. Defend against collusive SSDF attack using trust in cooperative spectrum sensing environment[C] //Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on. IEEE Computer Society, 2013: 1656-1661.
[5]
Attar A, Tang Helen, Vasilakos A V, et al. A survey of security challenges in cognitive radio networks: solutions and future research directions[J]. Proceedings of the IEEE, 2012, 100(12): 3172-3186.
[6]
Abdelhakim M, Lightfoot L E, Ren Jian, et al. Distributed detection in mobile access wireless sensor networks under byzantine attacks[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(4): 950-959.
[7]
Fragkiadakis A G, Tragos E Z, Askoxylakis I G. A survey on security threats and detection techniques in cognitive radio networks[J]. Communications Surveys and Tutorials, IEEE, 2013(1): 428-445.
[8]
Lu Jianqi, Wei Ping, Chen Zhe. A scheme to counter SSDF attacks based on hard decision in cognitive radio networks[J]. Wseas Transactions on Communications, 2014, 13(1): 242-248.
[9]
Lin Hui, Hu Jia, Ma Jianfeng, et al. A role based privacy-aware secure routing protocol for wireless mesh networks[J]. Wireless Personal Communications, 2014, 75(3): 1611-1633.
[10]
Parvin S, Hussain F K, Hussain O K. Conjoint trust assessment for secure communication in cognitive radio networks[J]. Mathematical and Computer Modelling, 2013, 58(5): 1340-1350.
[11]
Letaief K, Zhang Wei. Cooperative communications for cognitive radio networks[J]. Proceedings of the IEEE, 2009, 97(5): 878-893.