A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Adaptation from Transmission Security (TRANSEC) to Cognitive Radio Communication
[chapter]
2012
Advances in Cognitive Radio Systems
Therefore, flexible and convenient metrics for achieving these are www.intechopen.com Adaptation from Transmission Security (TRANSEC) to Cognitive Radio Communication 83 expected. ...
Advances in Cognitive Radio Systems 82 difficult for the unintended or intended receivers to detect between signal plus noise and noise alone, to distinguish between the signals, and to abstract feature ...
The proposed schemes and metrics can pave one practical way for system evaluations of cognitive radio communications (Liao et al., 2009) . ...
doi:10.5772/31217
fatcat:opnd2qz5fjhvxgqmgxripdyju4
Anti-jamming communication in cognitive radio networks with unknown channel statistics
2011
2011 19th IEEE International Conference on Network Protocols
Recently, many opportunistic spectrum sensing and access protocols have been proposed for cognitive radio networks (CRNs). ...
First, the assumptions they made are not practical, as before the communication starts, PUs' traffic statistics may not be readily available to the SUs. ...
ACKNOWLEDGMENT This work was partially supported by the US National Science Foundation under grants CNS-0831963, CNS-1117811, and CNS-1016260. ...
doi:10.1109/icnp.2011.6089079
dblp:conf/icnp/WangRN11
fatcat:b4gdajnfbrhwbexkj5zf3hyyc4
Intelligent-Reflecting-Surface-Assisted UAV Communications for 6G Networks
[article]
2023
arXiv
pre-print
However, the limited battery capacity of UAVs, dynamic and unpredictable channel environments, and communication resource constraints result in poor performance of traditional UAV-based networks. ...
First, primary issues, key technologies, and application scenarios of IRS-assisted UAV communications for 6G networks are introduced. ...
Generally, CR [63] , [140] and Symbiotic Radio (SR) [64] , [141] are used to improve spectrum efficiency. ...
arXiv:2310.20242v1
fatcat:favprbezjvgezlkyvvvhg3ofzy
A Comprehensive Review on Spectrum Management, Security and Energy-Efficient Cognitive Radio Networks
2019
International Journal of Computer Applications
Cognitive Radio Network (CRN) is an evident optimal solution in alleviating the challenges of spectrum unused potentially in wireless networks. ...
In addition, we study the energy efficient routing techniques like network optimization frameworks in cooperative networks, protocols and different types of attack issues, approaches for handling the secure ...
A lot of research activities have to be carried out in Spectrum management, Energy Efficient and Security techniques for the enhancement of Cognitive Radio Network communications Fig. 1 Fig. 2 12 Fig. ...
doi:10.5120/ijca2019918371
fatcat:d5yvihq4zfhvxbz4lml7bruxm4
A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks
[article]
2013
arXiv
pre-print
according to the radio environment under which they operate in order to achieve reliable and efficient communication and optimum utilization of the network resources. ...
However, this issue becomes even more critical in cognitive wireless sensor networks, a type of WSN in which the sensor nodes have the capabilities of changing their transmission and reception parameters ...
Kumar Nayak of National Institute of Science and Technology (NIST), Odisha, India. ...
arXiv:1308.0682v1
fatcat:zkwd6kpgkjaojhxkupzpggo67e
Low Earth Orbit Satellite Security and Reliability: Issues, Solutions, and the Road Ahead
[article]
2023
arXiv
pre-print
Furthermore, we shed light on several promising future research directions for enhancing the security and reliability of LEO SCSs, such as integrated sensing and communication, computer vision aided communications ...
Since there is a paucity of literature on the security and reliability issues of LEO Satellite Communication Systems (SCSs), we aim to fill this knowledge gap. ...
The family of SS modulations constitutes efficient techniques resisting jamming. ...
arXiv:2201.03063v3
fatcat:22isbnpdqnfxjecwpmiqu4bfli
Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols
2016
IEEE Communications Surveys and Tutorials
Index Terms-Advanced metering infrastructure (AMI), communication architecture, cognitive radio network (CRN), smart grid (SG). ...
SGs feature multi-way communication among energy generation, transmission, distribution, and usage facilities. ...
An MAB-based algorithm is applied to enable the secondary sender and receiver to approximate their optimal channel selection strategy, thus resulting in resistance to jamming attacks, even to a cognitive ...
doi:10.1109/comst.2015.2481722
fatcat:rnchxiumhndqho5tlumonfdoxi
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks
2016
IEEE Transactions on Vehicular Technology
Recently, many opportunistic spectrum sensing and access protocols have been proposed for cognitive radio networks (CRNs). ...
First, the assumptions they made are not practical, as before the communication starts, PUs' traffic statistics may not readily be available to the SUs. ...
We then propose an efficient and jamming-resistant multi-channel access protocol for ad hoc cognitive radio networks.
A. ...
doi:10.1109/tvt.2015.2511071
fatcat:qtrwvk4d65hznmz4p67rtuapga
Antifragile Communications
2018
IEEE Systems Journal
The traditional approach to addressing the jamming threat is to harden radios, such that they sacrifice communications performance for more advanced jamming protection. ...
reactive jamming mitigation strategy, for times when an antifragile approach is not practical. ...
The authors of [129] use a MDP approach to derive an optimal anti-jam strategy for secondary users in a cognitive radio network. ...
doi:10.1109/jsyst.2016.2517164
fatcat:mtbvuzc5wncklieuxidquvpqya
Denial of Service Attacks in Wireless Networks: The Case of Jammers
2011
IEEE Communications Surveys and Tutorials
This act is called jamming and the malicious nodes are referred to as jammers. ...
To give a simple example, a malicious node can continually transmit a radio signal in order to block any legitimate access to the medium and/or interfere with reception. ...
Initially, there were two motivations behind spread spectrum communications: (a) to resist enemy efforts to jam communications (anti-jam, or AJ) and (b) to hide the fact that communication was taking place ...
doi:10.1109/surv.2011.041110.00022
fatcat:3shw3wsgf5hzthokvk3cwjusfu
Exploiting Jamming Attacks for Energy Harvesting in Massive MIMO Systems
2021
ICC 2021 - IEEE International Conference on Communications
An optimal time-switching policy is also proposed to ensure user-fairness in terms of both harvested energy and achievable rate. ...
The key idea is to exploit the jamming transmissions as an energy source to be harvested at the legitimate users. ...
and analyzed to power the secondary users of a cognitive radio system through harvesting energy from primary user transmissions. ...
doi:10.1109/icc42927.2021.9500422
fatcat:hyzyvjopujaylbqogyj3ioch4u
2019 Index IEEE Transactions on Communications Vol. 67
2019
IEEE Transactions on Communications
., +, TCOMM March 2019 1831-1844 Energy Detection Spectrum Sensing in Full-Duplex Cognitive Radio: The Practical Case of Rician RSI. Design of Optimal Noncoherent Constellations for SIMO Systems. ...
., +, TCOMM Sept. 2019 6544-
6555
Hybrid Overlay-Underlay Cognitive Radio Networks With Energy Harvest-
ing. ...
doi:10.1109/tcomm.2019.2963622
fatcat:qd6so3reavde3eiukfknmpbfsu
2020 Index IEEE Transactions on Mobile Computing Vol. 19
2021
IEEE Transactions on Mobile Computing
., +, TMC May 2020 1170-1183 Channel coding Collusion-Resistant Jamming for Securing Legacy Clients in Wireless Networks. ...
., +, TMC April
2020 852-864
Near-Optimal and Truthful Online Auction for Computation Offloading in
Green Edge-Computing Systems. ...
doi:10.1109/tmc.2020.3036773
fatcat:6puiux5lp5bfvjo47ey7ycwyfu
RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey
[article]
2024
arXiv
pre-print
Given that the computational complexity of future communication systems that adopt RIS-assisted PLS is likely to increase rapidly as the number of interactions between the users and infrastructure grows ...
Subsequently, some optimization techniques are presented in the context of the underlying system model, followed by an assessment of the impact of RIS-assisted PLS through a comprehensive performance analysis ...
transfer (WPT) and SWIPT communications, optimizing energy transfer efficiency while ensuring secure communication channels. ...
arXiv:2403.10412v1
fatcat:yjnv3tiarnh4lpwxyam2qtpvqe
2020 Index IEEE Transactions on Vehicular Technology Vol. 69
2020
IEEE Transactions on Vehicular Technology
Yu, X., A Joint Design of Platoon Communication and Control Based on LTE-V2V; 15893-15907 Hong, C.S., see Nguyen, M.N.H., TVT May 2020 5618-5633 Hong, C.S., see Chen, D., TVT May 2020 5634-5646 Hong ...
Routing Optimization; TVT Sept. 2020 10177-10187 Hong, P., see Li, R., TVT April 2020 4006-4018 Hong, P., see Xu, J., TVT June 2020 6688-6698 Hong, W., see Youn, Y., 1719-1726 Hong, X., see Yang, Q. ...
., +, TVT Feb. 2020 2327-2331 An Optimal Policy for Hybrid Channel Access in Cognitive Radio Networks With Energy Harvesting. ...
doi:10.1109/tvt.2021.3055470
fatcat:536l4pgnufhixneoa3a3dibdma
« Previous
Showing results 1 — 15 out of 1,185 results