[go: up one dir, main page]

Min et al., 2009 - Google Patents

Attack-tolerant distributed sensing for dynamic spectrum access networks

Min et al., 2009

View PDF
Document ID
17846876468605968266
Author
Min A
Shin K
Hu X
Publication year
Publication venue
2009 17th IEEE International Conference on Network Protocols

External Links

Snippet

Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, distributed sensing has been recognized as a viable means to enhance the incumbent …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • H04W72/08Wireless resource allocation where an allocation plan is defined based on quality criteria
    • H04W72/082Wireless resource allocation where an allocation plan is defined based on quality criteria using the level of interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access

Similar Documents

Publication Publication Date Title
Min et al. Attack-tolerant distributed sensing for dynamic spectrum access networks
Min et al. Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation
Fragkiadakis et al. A survey on security threats and detection techniques in cognitive radio networks
Bhattacharjee et al. Vulnerabilities in cognitive radio networks: A survey
Min et al. Robust cooperative sensing via state estimation in cognitive radio networks
Marinho et al. A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
Chen et al. Cooperative spectrum sensing with M-ary quantized data in cognitive radio networks under SSDF attacks
US8670721B2 (en) Method for collaborative discrimation between authentic and spurious signals in a wireless cognitive network
Idoudi et al. Security challenges in cognitive radio networks
Jararweh et al. Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks
Kar et al. Security challenges in cognitive radio network and defending against Byzantine attack: a survey
Min et al. Joint optimal sensor selection and scheduling in dynamic spectrum access networks
Min et al. Robust tracking of small-scale mobile primary user in cognitive radio networks
Song et al. Finding out the liars: Fighting against false channel information exchange attacks in cognitive radio ad hoc networks
Bauer et al. Physical layer attacks on unlinkability in wireless lans
Lalouani et al. Countering radiometric signature exploitation using adversarial machine learning based protocol switching
Benedetto et al. Performance improvements of reputation-based cooperative spectrum sensing
León et al. Towards a cooperative intrusion detection system for cognitive radio networks
Amjad et al. Reputation aware collaborative spectrum sensing for mobile cognitive radio networks
Rizvi et al. Analysis of security vulnerabilities and threat assessment in Cognitive Radio (CR) networks
Hussein et al. Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks
León et al. Cognitive radio network security
Sodagari et al. Combating channel eviction triggering denial‐of‐service attacks in cognitive radio networks
Chen Investigation of primary user emulation attack in cognitive radio networks
Ramsey Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting