Standard

Dependence of Optimal Monitoring Strategy on the Application to be Protected. / Garnaev, A.; Trappe, W.; Kung, C.-T.

2012 IEEE Global Communications Conference (GLOBECOM), 3-7 December 2012, Anaheim, CA, USA. Institute of Electrical and Electronics Engineers Inc., 2012. стр. 1054-1059.

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийстатья в сборнике материалов конференциинаучная

Harvard

Garnaev, A, Trappe, W & Kung, C-T 2012, Dependence of Optimal Monitoring Strategy on the Application to be Protected. в 2012 IEEE Global Communications Conference (GLOBECOM), 3-7 December 2012, Anaheim, CA, USA. Institute of Electrical and Electronics Engineers Inc., стр. 1054-1059. https://doi.org/10.1109/GLOCOM.2012.6503252

APA

Garnaev, A., Trappe, W., & Kung, C-T. (2012). Dependence of Optimal Monitoring Strategy on the Application to be Protected. в 2012 IEEE Global Communications Conference (GLOBECOM), 3-7 December 2012, Anaheim, CA, USA (стр. 1054-1059). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/GLOCOM.2012.6503252

Vancouver

Garnaev A, Trappe W, Kung C-T. Dependence of Optimal Monitoring Strategy on the Application to be Protected. в 2012 IEEE Global Communications Conference (GLOBECOM), 3-7 December 2012, Anaheim, CA, USA. Institute of Electrical and Electronics Engineers Inc. 2012. стр. 1054-1059 https://doi.org/10.1109/GLOCOM.2012.6503252

Author

Garnaev, A. ; Trappe, W. ; Kung, C.-T. / Dependence of Optimal Monitoring Strategy on the Application to be Protected. 2012 IEEE Global Communications Conference (GLOBECOM), 3-7 December 2012, Anaheim, CA, USA. Institute of Electrical and Electronics Engineers Inc., 2012. стр. 1054-1059

BibTeX

@inproceedings{7b875e9737a64376b6a5b309b02721a1,
title = "Dependence of Optimal Monitoring Strategy on the Application to be Protected",
abstract = "Dynamic spectrum access is a powerful approach to taking advantage of opportunities in spectrum to communicate. Access to these spectral opportunities should be regulated and monitored to prevent unapproved theft of spectral resources, which ultimately belong to a primary user. Unfortunately, most of the literature devoted to spectrum scanning does not consider the over-arching application that a spectrum thief might try to run. In this paper, we show that the thief's application (specifically, its QoS requirements), plays a critical role in how the thief should attempt to sneak spectrum and, consequently, a critical role in how the spectrum monitoring infrastructure should scan spectrum to detect thievery of spectral resources. We study the difference in the thief's behavior when considering bandwidth and delay as the two primary QoS parameters he is concerned with. Loosely speaking, this corresponds to sneaking for file-download versus streaming video, and the ultimate lesson learned is that the detection p",
author = "A. Garnaev and W. Trappe and C.-T. Kung",
year = "2012",
doi = "10.1109/GLOCOM.2012.6503252",
language = "English",
pages = "1054--1059",
booktitle = "2012 IEEE Global Communications Conference (GLOBECOM), 3-7 December 2012, Anaheim, CA, USA",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

RIS

TY - GEN

T1 - Dependence of Optimal Monitoring Strategy on the Application to be Protected

AU - Garnaev, A.

AU - Trappe, W.

AU - Kung, C.-T.

PY - 2012

Y1 - 2012

N2 - Dynamic spectrum access is a powerful approach to taking advantage of opportunities in spectrum to communicate. Access to these spectral opportunities should be regulated and monitored to prevent unapproved theft of spectral resources, which ultimately belong to a primary user. Unfortunately, most of the literature devoted to spectrum scanning does not consider the over-arching application that a spectrum thief might try to run. In this paper, we show that the thief's application (specifically, its QoS requirements), plays a critical role in how the thief should attempt to sneak spectrum and, consequently, a critical role in how the spectrum monitoring infrastructure should scan spectrum to detect thievery of spectral resources. We study the difference in the thief's behavior when considering bandwidth and delay as the two primary QoS parameters he is concerned with. Loosely speaking, this corresponds to sneaking for file-download versus streaming video, and the ultimate lesson learned is that the detection p

AB - Dynamic spectrum access is a powerful approach to taking advantage of opportunities in spectrum to communicate. Access to these spectral opportunities should be regulated and monitored to prevent unapproved theft of spectral resources, which ultimately belong to a primary user. Unfortunately, most of the literature devoted to spectrum scanning does not consider the over-arching application that a spectrum thief might try to run. In this paper, we show that the thief's application (specifically, its QoS requirements), plays a critical role in how the thief should attempt to sneak spectrum and, consequently, a critical role in how the spectrum monitoring infrastructure should scan spectrum to detect thievery of spectral resources. We study the difference in the thief's behavior when considering bandwidth and delay as the two primary QoS parameters he is concerned with. Loosely speaking, this corresponds to sneaking for file-download versus streaming video, and the ultimate lesson learned is that the detection p

U2 - 10.1109/GLOCOM.2012.6503252

DO - 10.1109/GLOCOM.2012.6503252

M3 - Conference contribution

SP - 1054

EP - 1059

BT - 2012 IEEE Global Communications Conference (GLOBECOM), 3-7 December 2012, Anaheim, CA, USA

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

ID: 4727129