References
- A. Jones, Convergence, Information security technical report, Vol. 12, pp. 69-73, 2007. https://doi.org/10.1016/j.istr.2007.04.001
- D. Tyson, Security convergence-managing enterprise security risk, Elsevier, 2007.
- 고광진, 박창현, 송명선, 엄중선, 유성진, 임선민, 정회윤, 황성현, TV White Spaces에서의 CR 기술 동향, 전자통신동향분석, Vol. 24, No. 3, pp. 91-102, June 2009.
- I. F. Akyildiz, W. Y. Lee, M.C. Vuran and S. Mohanty, NeXt Generation / Dynamic Spectrum Access / Cognitive Radio Wireless Networks: A Survey, Computer Networks Journal, Vol. 50, pp. 2127-2159, September 2006. https://doi.org/10.1016/j.comnet.2006.05.001
- I. F. Akyildiz, W. Y. Lee, M.C. Vuran and S. Mohanty, A Survey on Spectrum Management in Cognitive Radio Networks, IEEE Communications Magazine, Vol. 46, pp. 40-48, April 2008.
- http://grouper.ieee.org/groups/802/22/, IEEE 802 LAN/MAN Standards Committee : 802.22 WG on WRANs (Wireless Regional Area Networks).
- IEEE 802.22, Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications: Policies and Procedures for Operation in the TV Bands, IEEE P802.22-D1.0, May 2008.
- IEEE 802.22, Proposed Resolutions to Comments Related to Security in 802.22 Draft v2, IEEE 802.22-08/0216r0, December 2009.
- J. Mitola III and G. Maguire, Cognitive radio: Making software radios more personal, IEEE Pers. Commun., Vol. 6, No. 4, pp. 13-18, August 1999. https://doi.org/10.1109/98.788210
- J. Mitola III, Cognitive radio: An integrated agent architecture for software radio architecture, Ph.D. Dissertation, Royal Institute of Technology (KTH), May 2000.
- IEEE 802.22, Protocol Reference Model Enhancements, Management Reference Model, Network Reference Model and Remote Management of the CPEs in 802.22, IEEE 802.22-08/0121r1010, November 2008.
- D. Johnston and J. Walker, Overview of IEEE 802.16 Security, IEEE Security and Privacy, Vol. 2, No. 3, pp. 40-48, May 2004.
- L. Maccari, M. Paoli, and R. Fantacci, Security Analysis of IEEE 802.16, ICC 2007, pp. 1160-1165, June 2007.
- N. Xiong, F. Yang, H. Li, J. Park, Y. Dai, and Y. Pan, Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network, Wireless Communications and Mobile Computing, DOI: 10.1002/wcm.872, 2009.
- H. Kim, IEEE 802.16/WiMAX security, http://www.ibluemojo.com/contents/IEEE%20802.16%20Security.pdf, 2007.
- R. Marin-Lopez, Y. Ohba, F. Perenigues, and A. F. Gomez. Analysis of Handover Key Management schemes under IETF perspective, Computer Standards & Interfaces, DOI:10.1016/j.csi.2009.10.001, 2009.
- T. C. Clancy and N. Georgen, Security in Cognitive Radio Networks : Threats and Mitigation, CrownCom 2008, pp. 1-8, May 2008.
- J. L. Burbank, Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security, CrownCom 2008, pp. 1-7, May 2008.
- P. Kaligineedi, M. Khabbazian and V. K. Bhargava, Secure Cooperative Sensing Techniques for Cognitive Radio Systems, ICC 2008, pp. 3406-3410, May 2008.
- K. Bian and J. Park, Security Vulnerabilities in IEEE 802.22, WICON 2008, Article No. 6, November 2008.
- IEEE 802.22, Privacy concerns, IEEE 802.22-09/0114, July 2009.