Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,185 Hits in 6.7 sec

Adaptation from Transmission Security (TRANSEC) to Cognitive Radio Communication [chapter]

Chien-Hsing Liao, Tai-Kuo Woo
2012 Advances in Cognitive Radio Systems  
Therefore, flexible and convenient metrics for achieving these are www.intechopen.com Adaptation from Transmission Security (TRANSEC) to Cognitive Radio Communication 83 expected.  ...  Advances in Cognitive Radio Systems 82 difficult for the unintended or intended receivers to detect between signal plus noise and noise alone, to distinguish between the signals, and to abstract feature  ...  The proposed schemes and metrics can pave one practical way for system evaluations of cognitive radio communications (Liao et al., 2009) .  ... 
doi:10.5772/31217 fatcat:opnd2qz5fjhvxgqmgxripdyju4

Anti-jamming communication in cognitive radio networks with unknown channel statistics

Qian Wang, Kui Ren, Peng Ning
2011 2011 19th IEEE International Conference on Network Protocols  
Recently, many opportunistic spectrum sensing and access protocols have been proposed for cognitive radio networks (CRNs).  ...  First, the assumptions they made are not practical, as before the communication starts, PUs' traffic statistics may not be readily available to the SUs.  ...  ACKNOWLEDGMENT This work was partially supported by the US National Science Foundation under grants CNS-0831963, CNS-1117811, and CNS-1016260.  ... 
doi:10.1109/icnp.2011.6089079 dblp:conf/icnp/WangRN11 fatcat:b4gdajnfbrhwbexkj5zf3hyyc4

Intelligent-Reflecting-Surface-Assisted UAV Communications for 6G Networks [article]

Zhaolong Ning, Tengfeng Li, Yu Wu, Xiaojie Wang, Qingqing Wu, Fei Richard Yu, Song Guo
2023 arXiv   pre-print
However, the limited battery capacity of UAVs, dynamic and unpredictable channel environments, and communication resource constraints result in poor performance of traditional UAV-based networks.  ...  First, primary issues, key technologies, and application scenarios of IRS-assisted UAV communications for 6G networks are introduced.  ...  Generally, CR [63] , [140] and Symbiotic Radio (SR) [64] , [141] are used to improve spectrum efficiency.  ... 
arXiv:2310.20242v1 fatcat:favprbezjvgezlkyvvvhg3ofzy

A Comprehensive Review on Spectrum Management, Security and Energy-Efficient Cognitive Radio Networks

Shyleshchandra Gudihatti, S. H., Venugopal K.
2019 International Journal of Computer Applications  
Cognitive Radio Network (CRN) is an evident optimal solution in alleviating the challenges of spectrum unused potentially in wireless networks.  ...  In addition, we study the energy efficient routing techniques like network optimization frameworks in cooperative networks, protocols and different types of attack issues, approaches for handling the secure  ...  A lot of research activities have to be carried out in Spectrum management, Energy Efficient and Security techniques for the enhancement of Cognitive Radio Network communications Fig. 1 Fig. 2 12 Fig.  ... 
doi:10.5120/ijca2019918371 fatcat:d5yvihq4zfhvxbz4lml7bruxm4

A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks [article]

Jaydip Sen
2013 arXiv   pre-print
according to the radio environment under which they operate in order to achieve reliable and efficient communication and optimum utilization of the network resources.  ...  However, this issue becomes even more critical in cognitive wireless sensor networks, a type of WSN in which the sensor nodes have the capabilities of changing their transmission and reception parameters  ...  Kumar Nayak of National Institute of Science and Technology (NIST), Odisha, India.  ... 
arXiv:1308.0682v1 fatcat:zkwd6kpgkjaojhxkupzpggo67e

Low Earth Orbit Satellite Security and Reliability: Issues, Solutions, and the Road Ahead [article]

Pingyue Yue, Jianping An, Jiankang Zhang, Jia Ye, Gaofeng Pan, Shuai Wang, Pei Xiao, Lajos Hanzo
2023 arXiv   pre-print
Furthermore, we shed light on several promising future research directions for enhancing the security and reliability of LEO SCSs, such as integrated sensing and communication, computer vision aided communications  ...  Since there is a paucity of literature on the security and reliability issues of LEO Satellite Communication Systems (SCSs), we aim to fill this knowledge gap.  ...  The family of SS modulations constitutes efficient techniques resisting jamming.  ... 
arXiv:2201.03063v3 fatcat:22isbnpdqnfxjecwpmiqu4bfli

Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols

Athar Ali Khan, Mubashir Husain Rehmani, Martin Reisslein
2016 IEEE Communications Surveys and Tutorials  
Index Terms-Advanced metering infrastructure (AMI), communication architecture, cognitive radio network (CRN), smart grid (SG).  ...  SGs feature multi-way communication among energy generation, transmission, distribution, and usage facilities.  ...  An MAB-based algorithm is applied to enable the secondary sender and receiver to approximate their optimal channel selection strategy, thus resulting in resistance to jamming attacks, even to a cognitive  ... 
doi:10.1109/comst.2015.2481722 fatcat:rnchxiumhndqho5tlumonfdoxi

Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks

Qian Wang, Kui Ren, Peng Ning, Shengshan Hu
2016 IEEE Transactions on Vehicular Technology  
Recently, many opportunistic spectrum sensing and access protocols have been proposed for cognitive radio networks (CRNs).  ...  First, the assumptions they made are not practical, as before the communication starts, PUs' traffic statistics may not readily be available to the SUs.  ...  We then propose an efficient and jamming-resistant multi-channel access protocol for ad hoc cognitive radio networks. A.  ... 
doi:10.1109/tvt.2015.2511071 fatcat:qtrwvk4d65hznmz4p67rtuapga

Antifragile Communications

Marc Lichtman, Matthew T. Vondal, T. Charles Clancy, Jeffrey H. Reed
2018 IEEE Systems Journal  
The traditional approach to addressing the jamming threat is to harden radios, such that they sacrifice communications performance for more advanced jamming protection.  ...  reactive jamming mitigation strategy, for times when an antifragile approach is not practical.  ...  The authors of [129] use a MDP approach to derive an optimal anti-jam strategy for secondary users in a cognitive radio network.  ... 
doi:10.1109/jsyst.2016.2517164 fatcat:mtbvuzc5wncklieuxidquvpqya

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Konstantinos Pelechrinis, Marios Iliofotou, Srikanth V. Krishnamurthy
2011 IEEE Communications Surveys and Tutorials  
This act is called jamming and the malicious nodes are referred to as jammers.  ...  To give a simple example, a malicious node can continually transmit a radio signal in order to block any legitimate access to the medium and/or interfere with reception.  ...  Initially, there were two motivations behind spread spectrum communications: (a) to resist enemy efforts to jam communications (anti-jam, or AJ) and (b) to hide the fact that communication was taking place  ... 
doi:10.1109/surv.2011.041110.00022 fatcat:3shw3wsgf5hzthokvk3cwjusfu

Exploiting Jamming Attacks for Energy Harvesting in Massive MIMO Systems

Hayder Al-Hraishawi, Symeon Chatzinotas, Bjorn Ottersten
2021 ICC 2021 - IEEE International Conference on Communications  
An optimal time-switching policy is also proposed to ensure user-fairness in terms of both harvested energy and achievable rate.  ...  The key idea is to exploit the jamming transmissions as an energy source to be harvested at the legitimate users.  ...  and analyzed to power the secondary users of a cognitive radio system through harvesting energy from primary user transmissions.  ... 
doi:10.1109/icc42927.2021.9500422 fatcat:hyzyvjopujaylbqogyj3ioch4u

2019 Index IEEE Transactions on Communications Vol. 67

2019 IEEE Transactions on Communications  
., +, TCOMM March 2019 1831-1844 Energy Detection Spectrum Sensing in Full-Duplex Cognitive Radio: The Practical Case of Rician RSI. Design of Optimal Noncoherent Constellations for SIMO Systems.  ...  ., +, TCOMM Sept. 2019 6544- 6555 Hybrid Overlay-Underlay Cognitive Radio Networks With Energy Harvest- ing.  ... 
doi:10.1109/tcomm.2019.2963622 fatcat:qd6so3reavde3eiukfknmpbfsu

2020 Index IEEE Transactions on Mobile Computing Vol. 19

2021 IEEE Transactions on Mobile Computing  
., +, TMC May 2020 1170-1183 Channel coding Collusion-Resistant Jamming for Securing Legacy Clients in Wireless Networks.  ...  ., +, TMC April 2020 852-864 Near-Optimal and Truthful Online Auction for Computation Offloading in Green Edge-Computing Systems.  ... 
doi:10.1109/tmc.2020.3036773 fatcat:6puiux5lp5bfvjo47ey7ycwyfu

RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey [article]

Majid H. Khoshafa, Omar Maraqa, Jules M. Moualeu, Sylvester Aboagye, Telex M. N. Ngatched, Mohamed H. Ahmed, Yasser Gadallah, Marco Di Renzo
2024 arXiv   pre-print
Given that the computational complexity of future communication systems that adopt RIS-assisted PLS is likely to increase rapidly as the number of interactions between the users and infrastructure grows  ...  Subsequently, some optimization techniques are presented in the context of the underlying system model, followed by an assessment of the impact of RIS-assisted PLS through a comprehensive performance analysis  ...  transfer (WPT) and SWIPT communications, optimizing energy transfer efficiency while ensuring secure communication channels.  ... 
arXiv:2403.10412v1 fatcat:yjnv3tiarnh4lpwxyam2qtpvqe

2020 Index IEEE Transactions on Vehicular Technology Vol. 69

2020 IEEE Transactions on Vehicular Technology  
Yu, X., A Joint Design of Platoon Communication and Control Based on LTE-V2V; 15893-15907 Hong, C.S., see Nguyen, M.N.H., TVT May 2020 5618-5633 Hong, C.S., see Chen, D., TVT May 2020 5634-5646 Hong  ...  Routing Optimization; TVT Sept. 2020 10177-10187 Hong, P., see Li, R., TVT April 2020 4006-4018 Hong, P., see Xu, J., TVT June 2020 6688-6698 Hong, W., see Youn, Y., 1719-1726 Hong, X., see Yang, Q.  ...  ., +, TVT Feb. 2020 2327-2331 An Optimal Policy for Hybrid Channel Access in Cognitive Radio Networks With Energy Harvesting.  ... 
doi:10.1109/tvt.2021.3055470 fatcat:536l4pgnufhixneoa3a3dibdma
« Previous Showing results 1 — 15 out of 1,185 results