Standard

One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious. / Garnaev, A.; Trappe, W.

в: IEEE Transactions on Information Forensics and Security, Том 10, № 5, 2015, стр. 1064-1075.

Результаты исследований: Научные публикации в периодических изданияхстатья

Harvard

Garnaev, A & Trappe, W 2015, 'One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious', IEEE Transactions on Information Forensics and Security, Том. 10, № 5, стр. 1064-1075. https://doi.org/10.1109/TIFS.2015.2398360

APA

Garnaev, A., & Trappe, W. (2015). One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious. IEEE Transactions on Information Forensics and Security, 10(5), 1064-1075. https://doi.org/10.1109/TIFS.2015.2398360

Vancouver

Author

Garnaev, A. ; Trappe, W. / One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious. в: IEEE Transactions on Information Forensics and Security. 2015 ; Том 10, № 5. стр. 1064-1075.

BibTeX

@article{14626e03ab1347d1bd58f3d2213e5a21,
title = "One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious",
abstract = "The reliable coordination of communication channels between two organizations is becoming an increasingly important problem as we move toward cognitive radio systems that support dynamic spectrum access. The benefit of such coordination is clear in scenarios when both participants are completely benign, but such benefits can be easily negated if one of the participants operates in a manner contrary to their channel assignment. In this paper, we develop and explore a maxmin transmission protocol for a primary user (PU) in a multiband wireless network, where the secondary user (SU) may be malicious and have an intent to cause interference. In this case, the threat that a SU may be an adversary changes the problem and places the PU in a dilemma: 1) if the SU is an adversary then to decrease the probability of interference it is better for the PU to select which channels it uses from a larger set of bands (i.e., possibly even including the bands reserved for the SU) and 2) if the SU turns out to be law obedient,",
author = "A. Garnaev and W. Trappe",
year = "2015",
doi = "10.1109/TIFS.2015.2398360",
language = "English",
volume = "10",
pages = "1064--1075",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "5",

}

RIS

TY - JOUR

T1 - One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious

AU - Garnaev, A.

AU - Trappe, W.

PY - 2015

Y1 - 2015

N2 - The reliable coordination of communication channels between two organizations is becoming an increasingly important problem as we move toward cognitive radio systems that support dynamic spectrum access. The benefit of such coordination is clear in scenarios when both participants are completely benign, but such benefits can be easily negated if one of the participants operates in a manner contrary to their channel assignment. In this paper, we develop and explore a maxmin transmission protocol for a primary user (PU) in a multiband wireless network, where the secondary user (SU) may be malicious and have an intent to cause interference. In this case, the threat that a SU may be an adversary changes the problem and places the PU in a dilemma: 1) if the SU is an adversary then to decrease the probability of interference it is better for the PU to select which channels it uses from a larger set of bands (i.e., possibly even including the bands reserved for the SU) and 2) if the SU turns out to be law obedient,

AB - The reliable coordination of communication channels between two organizations is becoming an increasingly important problem as we move toward cognitive radio systems that support dynamic spectrum access. The benefit of such coordination is clear in scenarios when both participants are completely benign, but such benefits can be easily negated if one of the participants operates in a manner contrary to their channel assignment. In this paper, we develop and explore a maxmin transmission protocol for a primary user (PU) in a multiband wireless network, where the secondary user (SU) may be malicious and have an intent to cause interference. In this case, the threat that a SU may be an adversary changes the problem and places the PU in a dilemma: 1) if the SU is an adversary then to decrease the probability of interference it is better for the PU to select which channels it uses from a larger set of bands (i.e., possibly even including the bands reserved for the SU) and 2) if the SU turns out to be law obedient,

U2 - 10.1109/TIFS.2015.2398360

DO - 10.1109/TIFS.2015.2398360

M3 - Article

VL - 10

SP - 1064

EP - 1075

JO - IEEE Transactions on Information Forensics and Security

JF - IEEE Transactions on Information Forensics and Security

SN - 1556-6013

IS - 5

ER -

ID: 5773367