Journal of shanghai Jiaotong University (Science) ›› 2011, Vol. 16 ›› Issue (6): 641-647.doi: 10.1007/s12204-011-1204-6
• Articles • Next Articles
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生)
Received:
2011-01-24
Online:
2011-12-30
Published:
2012-01-12
Contact:
ZHAO Shi-kang (赵士康)
E-mail:zhaoshikang512@163.com
CLC Number:
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生). Reputation-Based Collaborative Spectrum Sensing Scheme in Cognitive Radio Networks[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(6): 641-647.
1 FCC Spectrum Efficiency Working Group. Report of the spectrum efficiency working group [EB/OL]. (2011-01-20) [2002-11-15]. http://www.fcc.gov/ sptf/ reports.html. 2 Haykin S. Cognitive radio: Brain-empowered wireless communications [J]. IEEE Journal on Selected Areas in Communications, 2005, 23 (2): 201-220. 3 Sahai A, Hoven N, Tandra R. Some fundamental limits on cognitive radio [C]// Proceedings of Allerton Conference on Communication, Control and Computing. Piscataway, NJ: IEEE, 2004: 131-136. 4 Ghasemi A, Sousa E S. Collaborative spectrum sensing for opportunistic access in fading environments [C]// First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks. Piscataway, NJ: IEEE, 2005: 131-136. 5 Sun C, Zhang W, Letaief K B. Cluster-based cooperative spectrum sensing in cognitive radio systems [C]// IEEE International Conference on Communications. Piscataway, NJ: IEEE, 2007: 2511-2515. 6 Chen R, Park J M, Bian R. Robust distributed spectrum sensing in cognitive radio networks [C]// INFOCOM, the 27th Conference on Computer Communications IEEE. Piscataway, NJ: IEEE, 2008: 1876-1884. 7 Mishra S M, Sahai A, Brodersen R W. Cooperative sensing among cognitive radios [C]// ICC'06. IEEE International Conference. Piscataway, NJ: IEEE, 2006: 1658-1663. 8 Xu S, Shang Y, Wang H. Double thresholds based cooperative spectrum sensing against untrusted secondary users in cognitive radio networks [C]// Vehicular Technology Conference IEEE 69th.Piscataway, NJ: IEEE, 2009: 1-5. 9 Kaligineedi P, Khabbazian M, Bhargava V K. Secure cooperative sensing techniques for cognitive radio systems [C]// ICC'08. IEEE International Conference. Piscataway, NJ: IEEE, 2008: 3406-3410. 10 Hu F, Wang S, Cheng Z. Secure cooperative spectrum sensing for cognitive radio networks [C]// Military Communications Conference MILCOM. Piscataway, NJ: IEEE, 2009: 1-7. 11 Gao F, Yuan W, Liu W, et al. A robust and efficient cooperative spectrum sensing scheme in cognitive radio networks [C]// Communications Workshops (ICC), 2010 IEEE International Conference. Piscataway, NJ: IEEE, 2010: 1-5. 12 Chen H, Jin X, Xie L . Reputation-based collaborative spectrum sensing algorithm in cognitive radio networks [C]// Personal, Indoor and Mobile Radio Communications, 2009 IEEE 20th International Symposium . Piscataway, NJ: IEEE, 2009: 582-587. 13 Zhao T, Zhao Y . A new cooperative detection technique with malicious user suppression [C]// ICC'09. IEEE International Conference. Piscataway, NJ: IEEE, 2009: 1-5. 14 Ma J, Li Y . Soft combination and detection for cooperative spectrum sensing in cognitive radio networks [C]// Global Telecommunications Conference, GLOBECOM. Piscataway, NJ: IEEE, 2007: 3139-3143. |
[1] | LI Hongxin, ZHONG Zuhao, LU Yi, WEN Yunfeng. Optimization of Frequency Control Parameters of Wind Farms Considering Inertia Security Requirement [J]. Journal of Shanghai Jiao Tong University, 2025, 59(3): 323-332. |
[2] | TANG Cheng, LIANG Yilin, LI Wenjie, CHEN Guoling. Research on Security of Wideband Communication Satellite Situational Awareness Network [J]. Air & Space Defense, 2025, 8(2): 136-141. |
[3] | CHEN Yi, WANG Han, ZENG Dan, YAN Zheng, XUE Bike, ZHAO Le, XIONG Xuejun, FENG Yuyao. A Fast Calculation Method for N-1 Security-Constrained Economic Dispatch via Low-Rank Approximation Surrogate Model [J]. Journal of Shanghai Jiao Tong University, 2024, 58(10): 1524-1533. |
[4] | YE Lun, OUYANG Xu, YAO Jiangang, YANG Shengjie, YIN Jungang. Reliability Index Calculation and Reserve Capacity Optimization Considering Multiple Uncertainties [J]. Journal of Shanghai Jiao Tong University, 2024, 58(1): 30-39. |
[5] | ZHANG Qingguo, LIU Chunyue, LUO Song, WANG Shuili, LIU Qing. Current Status and Prospects of External Security Technology for Offshore Platforms [J]. Ocean Engineering Equipment and Technology, 2023, 10(4): 92-106. |
[6] | WANG Zhaoxi, SHENG Peng, LI Yunyun, WU Xinkai, HUANG Yuejin. Multiaxial Vibration Security and Validity Verification of Connecting Pieces in Typical Section [J]. Air & Space Defense, 2023, 6(1): 85-95. |
[7] | WU Nan, CHENG Zhetao, DU Liang, SHEN Yingping. Network Security Inference Method Based on Dempster-Shafer Theory [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 77-81. |
[8] | ZHOU Yi, QIN Kangping, SUN Jinwen, FAN Dongqi, ZHENG Yiming. Real-Time Risk Evaluation Method of Power System Equipment and N-m Fault Contingency Plan Generation Under Typhoon Meteorological Environment [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 22-30. |
[9] | ZHANG Liang, QU Gang, LI Huixing, JIN Haochun. Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 103-109. |
[10] | ZHANG Taolue∗ (张韬略), TU Huizhao (涂辉招), QIU Wei (邱 炜). Developing High-Precision Maps for Automated Driving in China: Legal Obstacles and the Way to Overcome Them [J]. J Shanghai Jiaotong Univ Sci, 2021, 26(5): 658-669. |
[11] | CHEN Ying, WEI Guoning, TANG Shengyong, KANG Zhiyu. Global Space Security Situation Analysis and Development Proposal [J]. Air & Space Defense, 2021, 4(3): 99-104. |
[12] | WANG Mingzheng, WANG Yijie, WANG Tianyu, HOU Linzao, LI Mian . New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions [J]. J Shanghai Jiaotong Univ Sci, 2020, 25(6): 689-699. |
[13] | YANG Guangyu, QIU Hongbing. Robust Optimization for Energy Efficiency for Secrecy MIMO SWIPT Systems [J]. Journal of Shanghai Jiao Tong University, 2020, 54(4): 369-375. |
[14] | SUN Zhuo,LIU Dong,XIAO Anhong,MING Pingzhou,GUO Wen,ZHOU Junyi,CHEN Junjie. Information Security Analysis of Digital Control System Based on Attack Tree Model [J]. Journal of Shanghai Jiaotong University, 2019, 53(Sup.1): 68-73. |
[15] | LI Jianhua. A Survey of New E-Government and Its Security Technologies [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1370-1381. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 572
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 2546
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||