Min et al., 2009 - Google Patents
Attack-tolerant distributed sensing for dynamic spectrum access networksMin et al., 2009
View PDF- Document ID
- 17846876468605968266
- Author
- Min A
- Shin K
- Hu X
- Publication year
- Publication venue
- 2009 17th IEEE International Conference on Network Protocols
External Links
Snippet
Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, distributed sensing has been recognized as a viable means to enhance the incumbent …
- 238000001228 spectrum 0 title abstract description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
- H04W72/08—Wireless resource allocation where an allocation plan is defined based on quality criteria
- H04W72/082—Wireless resource allocation where an allocation plan is defined based on quality criteria using the level of interference
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Min et al. | Attack-tolerant distributed sensing for dynamic spectrum access networks | |
| Min et al. | Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation | |
| Fragkiadakis et al. | A survey on security threats and detection techniques in cognitive radio networks | |
| Bhattacharjee et al. | Vulnerabilities in cognitive radio networks: A survey | |
| Min et al. | Robust cooperative sensing via state estimation in cognitive radio networks | |
| Marinho et al. | A survey on security attacks and countermeasures with primary user detection in cognitive radio networks | |
| Chen et al. | Cooperative spectrum sensing with M-ary quantized data in cognitive radio networks under SSDF attacks | |
| US8670721B2 (en) | Method for collaborative discrimation between authentic and spurious signals in a wireless cognitive network | |
| Idoudi et al. | Security challenges in cognitive radio networks | |
| Jararweh et al. | Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks | |
| Kar et al. | Security challenges in cognitive radio network and defending against Byzantine attack: a survey | |
| Min et al. | Joint optimal sensor selection and scheduling in dynamic spectrum access networks | |
| Min et al. | Robust tracking of small-scale mobile primary user in cognitive radio networks | |
| Song et al. | Finding out the liars: Fighting against false channel information exchange attacks in cognitive radio ad hoc networks | |
| Bauer et al. | Physical layer attacks on unlinkability in wireless lans | |
| Lalouani et al. | Countering radiometric signature exploitation using adversarial machine learning based protocol switching | |
| Benedetto et al. | Performance improvements of reputation-based cooperative spectrum sensing | |
| León et al. | Towards a cooperative intrusion detection system for cognitive radio networks | |
| Amjad et al. | Reputation aware collaborative spectrum sensing for mobile cognitive radio networks | |
| Rizvi et al. | Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks | |
| Hussein et al. | Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks | |
| León et al. | Cognitive radio network security | |
| Sodagari et al. | Combating channel eviction triggering denial‐of‐service attacks in cognitive radio networks | |
| Chen | Investigation of primary user emulation attack in cognitive radio networks | |
| Ramsey | Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting |