Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции
Dependence of Optimal Monitoring Strategy on the Application to be Protected. / Garnaev, A.; Trappe, W.; Kung, C.-T.
2012 IEEE Global Communications Conference (GLOBECOM), 3-7 December 2012, Anaheim, CA, USA. Institute of Electrical and Electronics Engineers Inc., 2012. стр. 1054-1059.Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции
}
TY - GEN
T1 - Dependence of Optimal Monitoring Strategy on the Application to be Protected
AU - Garnaev, A.
AU - Trappe, W.
AU - Kung, C.-T.
PY - 2012
Y1 - 2012
N2 - Dynamic spectrum access is a powerful approach to taking advantage of opportunities in spectrum to communicate. Access to these spectral opportunities should be regulated and monitored to prevent unapproved theft of spectral resources, which ultimately belong to a primary user. Unfortunately, most of the literature devoted to spectrum scanning does not consider the over-arching application that a spectrum thief might try to run. In this paper, we show that the thief's application (specifically, its QoS requirements), plays a critical role in how the thief should attempt to sneak spectrum and, consequently, a critical role in how the spectrum monitoring infrastructure should scan spectrum to detect thievery of spectral resources. We study the difference in the thief's behavior when considering bandwidth and delay as the two primary QoS parameters he is concerned with. Loosely speaking, this corresponds to sneaking for file-download versus streaming video, and the ultimate lesson learned is that the detection p
AB - Dynamic spectrum access is a powerful approach to taking advantage of opportunities in spectrum to communicate. Access to these spectral opportunities should be regulated and monitored to prevent unapproved theft of spectral resources, which ultimately belong to a primary user. Unfortunately, most of the literature devoted to spectrum scanning does not consider the over-arching application that a spectrum thief might try to run. In this paper, we show that the thief's application (specifically, its QoS requirements), plays a critical role in how the thief should attempt to sneak spectrum and, consequently, a critical role in how the spectrum monitoring infrastructure should scan spectrum to detect thievery of spectral resources. We study the difference in the thief's behavior when considering bandwidth and delay as the two primary QoS parameters he is concerned with. Loosely speaking, this corresponds to sneaking for file-download versus streaming video, and the ultimate lesson learned is that the detection p
U2 - 10.1109/GLOCOM.2012.6503252
DO - 10.1109/GLOCOM.2012.6503252
M3 - Conference contribution
SP - 1054
EP - 1059
BT - 2012 IEEE Global Communications Conference (GLOBECOM), 3-7 December 2012, Anaheim, CA, USA
PB - Institute of Electrical and Electronics Engineers Inc.
ER -
ID: 4727129