Opportunistic spectrum access for energy-constrained cognitive radios

2009 ◽  
Vol 8 (3) ◽  
pp. 1206-1211 ◽  
Author(s):  
Anh Tuan Hoang ◽  
Ying-Chang Liang ◽  
David Tung Chong Wong ◽  
Yonghong Zeng ◽  
Rui Zhang
Author(s):  
Alexander W. Min ◽  
Kyu-Han Kim ◽  
Jatinder Pal Singh ◽  
Kang G. Shin

Author(s):  
Krešimir Dabcevic ◽  
Lucio Marcenaro ◽  
Carlo S. Regazzoni

While potentially solving the spectrum underutilization problem using methods such as dynamic and opportunistic spectrum access, Cognitive Radios (CRs) also bring a set of security issues and potential breaches that have to be addressed. These issues come from the two important capabilities implemented within CRs: their cognition ability and reconfigurability. This chapter focuses on identifying, presenting, and classifying the main potential security attacks and vulnerabilities, as well as proposing appropriate counter-measures and solutions for them. These are supplemented by simulation results and metrics, with the intention of estimating the efficiency of each of the observed attacks and its counter-measure. The presented simulations are performed in the proprietary C/C++ and Matlab/Simulink simulators. nSHIELD is a major ongoing European embedded systems security-related project, which is used to demonstrate the practicability of the potential implementation of the proposed countermeasures and solutions for the discussed security problems and issues.


Sign in / Sign up

Export Citation Format

Share Document