Результаты исследований: Научные публикации в периодических изданиях › статья
One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious. / Garnaev, A.; Trappe, W.
в: IEEE Transactions on Information Forensics and Security, Том 10, № 5, 2015, стр. 1064-1075.Результаты исследований: Научные публикации в периодических изданиях › статья
}
TY - JOUR
T1 - One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious
AU - Garnaev, A.
AU - Trappe, W.
PY - 2015
Y1 - 2015
N2 - The reliable coordination of communication channels between two organizations is becoming an increasingly important problem as we move toward cognitive radio systems that support dynamic spectrum access. The benefit of such coordination is clear in scenarios when both participants are completely benign, but such benefits can be easily negated if one of the participants operates in a manner contrary to their channel assignment. In this paper, we develop and explore a maxmin transmission protocol for a primary user (PU) in a multiband wireless network, where the secondary user (SU) may be malicious and have an intent to cause interference. In this case, the threat that a SU may be an adversary changes the problem and places the PU in a dilemma: 1) if the SU is an adversary then to decrease the probability of interference it is better for the PU to select which channels it uses from a larger set of bands (i.e., possibly even including the bands reserved for the SU) and 2) if the SU turns out to be law obedient,
AB - The reliable coordination of communication channels between two organizations is becoming an increasingly important problem as we move toward cognitive radio systems that support dynamic spectrum access. The benefit of such coordination is clear in scenarios when both participants are completely benign, but such benefits can be easily negated if one of the participants operates in a manner contrary to their channel assignment. In this paper, we develop and explore a maxmin transmission protocol for a primary user (PU) in a multiband wireless network, where the secondary user (SU) may be malicious and have an intent to cause interference. In this case, the threat that a SU may be an adversary changes the problem and places the PU in a dilemma: 1) if the SU is an adversary then to decrease the probability of interference it is better for the PU to select which channels it uses from a larger set of bands (i.e., possibly even including the bands reserved for the SU) and 2) if the SU turns out to be law obedient,
U2 - 10.1109/TIFS.2015.2398360
DO - 10.1109/TIFS.2015.2398360
M3 - Article
VL - 10
SP - 1064
EP - 1075
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
SN - 1556-6013
IS - 5
ER -
ID: 5773367