Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,277 Hits in 5.5 sec

Guest Editorial Game Theory in Wireless Communications

Alireza Attar, Tamer Basar, Merouane Debbah, H. Vincent Poor, Qing Zhao
2012 IEEE Journal on Selected Areas in Communications  
Joint channel and power scheduling in CR networks is the focus of Ni and Zarakovitis in their paper Joint Channel and Power Allocation in Cognitive Radio Systems.  ...  Stable Channel Access Control in Cognitive Radio Systems.  ... 
doi:10.1109/jsac.2012.120101 fatcat:teddaemtujgjnevgsw7wsufpuy

Table of Contents

2021 2021 IEEE 46th Conference on Local Computer Networks (LCN)  
Spectrum Access in Cognitive Radio Networks in the 5G and IoT Era 403 A Vehicle Message Scheduling Scheme for Vehicle Trust Management 407 Distributed Task Migration Optimization in MEC by Deep  ...  the Analysis and ML-Based Classification of Cyberattack Traffic 140 Adaptive Warden Strategy for Countering Network Covert Storage Channels 148 SPCAuth: Scalable and Privacy-Preserving Continuous Authentication  ... 
doi:10.1109/lcn52139.2021.9524933 fatcat:bopsc4l2qrc7bobzfyb6343iou

Table of contents

2021 IEEE Wireless Communications Letters  
Hiroshi Saito 1914 Vertical Beamforming in Intelligent Reflecting Surface-Aided Cognitive Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Liang Yang, Qi Zhu, Sai Li, Imran Shafique Ansari, and Siyuan Yu 2041 Throughput Optimal Opportunistic Channel Switching in Cognitive Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/lwc.2021.3105857 fatcat:nzelozqixra57l3hlzgga62pd4

Table of Contents

2020 IEEE Systems Journal  
Xiong 3779 Residual Energy Maximization in Cognitive Radio Networks With Q-Routing . . . . . A. Paul, A. Banerjee, and S. P.  ...  Bhalja 3705 Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA . 3916 Quantum-Inspired Genetic Programming Algorithm for the Crude Oil Scheduling of a Real-World Refinery  ... 
doi:10.1109/jsyst.2020.3002414 fatcat:4zowidiq3vfqfelreskbjknt5u

On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels?

S. Sengupta, S. Anand, K. Hong, R. Chandramouli
2009 ACM SIGMOBILE Mobile Computing and Communications Review  
We present a dynamic minimax camouflaging strategy for the covert network and sensing and jamming strategies for the attacker.  ...  In this paper, we study tactical covert timing networks with dynamic spectrum access capability amidst adversaries. We present a two-tier game framework to model the attackdefense scenario.  ...  With this in mind, we implement a tactical covert network with DSA capability based on cognitive radios (CR).  ... 
doi:10.1145/1621076.1621086 fatcat:fagwcxqg3fbkxd34dmrbowefxq

Contents

2014 Procedia Computer Science  
Cooperative Cognitive Radio Networks M.  ...  Space Time Block Code for Next Generation Multi-user MIMO Systems N.  ... 
doi:10.1016/s1877-0509(14)00957-0 fatcat:xvzb2nvkzrafdgrdxge3bqo5oe

Physical Layer Security for UAV Communications in 5G and Beyond Networks [article]

Jue Wang, Xuanxuan Wang, Ruifeng Gao, Chengleyang Lei, Wei Feng, Ning Ge, Shi Jin, Tony Q. S. Quek
2021 arXiv   pre-print
Then, we introduce the widely used secrecy performance metrics and start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems, and extend the discussion  ...  Finally, potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS in 5G and beyond networks.  ...  The UAV may act as a secondary transmitter in a cognitive radio (CR) network [66] , [184] .  ... 
arXiv:2105.11332v1 fatcat:d6oidecjcbaxrdz3kezdjxpypa

A layered approach to cognitive radio network security: A survey

Deanna Hlavacek, J. Morris Chang
2014 Computer Networks  
In addition, the cognitive radio network is vulnerable to new attacks based on cognitive radio innovations, such as spectrum sharing, spectrum sensing, cognitive capability, and radio reconfigurability  ...  With the realization of cognitive radio networks came the recognition that both new and old security threats are relevant.  ...  This indicates it is feasible to identify a transmitter for primary user emulation defense. Performance analysis of the cognitive radio network is the focus of the paper [110] .  ... 
doi:10.1016/j.comnet.2014.10.001 fatcat:eo4kskzcbzdvfap7srpsdhxkpy

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda
2021 IEEE Access  
The invited article "Covert channels in the MQTT-based Internet of Things," by Velinov et al., presents the first comprehensive study of covert channels in the Internet of Things (IoT) environments by  ...  studying the network information hiding patterns, which presents an emerging topic of security solutions in decentralized communication.  ...  The article ''Cooperative secondary encryption for primary privacy preserving in cognitive radio networks,'' by Wang et al., discusses secure cognitive communication, where a primary system directly transmits  ... 
doi:10.1109/access.2021.3075818 fatcat:7t3tgqarsndc5dq2gulr7hapzi

2021 Index IEEE Transactions on Wireless Communications Vol. 20

2021 IEEE Transactions on Wireless Communications  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  -that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021.  ...  ., +, TWC Sept. 2021 6195-6209 Online Primary User Emulation Attacks in Cognitive Radio Networks Using Thompson Sampling.  ... 
doi:10.1109/twc.2021.3135649 fatcat:bgd3vzb7pbee7jp75dnbucihmq

Table of Contents

2020 IEEE Transactions on Vehicular Technology  
Le 2802 Degrees of Freedom for Half-Duplex and Full-Duplex Multi-User Cognitive Radios . . . . D. Li, D. Zhang, and G.  ...  Uchôa-Filho 2957 Location Based Joint Spectrum Sensing and Radio Resource Allocation in Cognitive Radio Enabled LTE-U Systems . . .  ... 
doi:10.1109/tvt.2020.2970959 fatcat:rmi2juemdneozo47iagkyagi6i

2020 Index IEEE Transactions on Wireless Communications Vol. 19

2020 IEEE Transactions on Wireless Communications  
., Joint Access and Backhaul Resource Management in Satellite-Drone Networks: A Competitive Market Approach; TWC June 2020 3908-3923 Hu, Y.H., see Xia, M., TWC June 2020 3769-3781 Hua, C., see Li, M  ...  TWC Jan. 2020 650-664 Huang, A., see He, H., TWC Dec. 2020 7881-7896 Huang, C., Molisch, A.F., He, R., Wang, R., Tang, P., Ai, B., and Zhong, Z., Machine Learning-Enabled LOS/NLOS Identification for  ...  ., +, TWC Sept. 2020 5749-5764 Cognitive radio Analysis of the On-Demand Spectrum Access Architecture for CBRS Cognitive Radio Networks.  ... 
doi:10.1109/twc.2020.3044507 fatcat:ie4rwz4dgvaqbaxf3idysubc54

A Survey on C-RAN Security

Fengyu Tian, Peng Zhang, Zheng Yan
2017 IEEE Access  
to meet end-user requirements.  ...  INDEX TERMS Cloud radio access network (C-RAN), security, security threats, 5G, trust.  ...  In the traditional radio network architecture, there are two types of main impersonation attacks: Cognitive Radio (CR) node impersonation attack and primary user impersonation attack.  ... 
doi:10.1109/access.2017.2717852 fatcat:scniungu3feefjpfno3dm2dtbi

Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial [article]

Lu Lv, Dongyang Xu, Rose Qingyang Hu, Yinghui Ye, Long Yang, Xianfu Lei, Xianbin Wang, Dong In Kim, Arumugam Nallanathan
2024 arXiv   pre-print
This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks.  ...  relationship among paired NOMA users.  ...  ACKNOWLEDGEMENT The authors would like to thank the current and past members of the research groups at Xidian University and Xi'an Jiaotong University, for their contributions to the work reported in this  ... 
arXiv:2403.16477v1 fatcat:jc3hu4bxgbfudibqp2nn334jdi

2019 Index IEEE Systems Journal Vol. 13

2019 IEEE Systems Journal  
., +, JSYST Dec. 2019 4060-4071 Optimal Precoder Designs for Sum-Utility Maximization in SWIPT-Enabled Multi-User MIMO Cognitive Radio Networks.  ...  ., +, JSYST March 2019 377-388 Optimal Precoder Designs for Sum-Utility Maximization in SWIPT-Enabled Multi-User MIMO Cognitive Radio Networks.  ... 
doi:10.1109/jsyst.2020.2965224 fatcat:x7hx4luelzforfuzigmwmfyhgm
« Previous Showing results 1 — 15 out of 1,277 results