메뉴 건너뛰기




Volumn , Issue , 2012, Pages 195-204

Enforcing dynamic spectrum access with spectrum permits

Author keywords

cognitive radios; dynamic spectrum access; spectrum misuse detection; spectrum permits

Indexed keywords

AUTHORIZED USERS; DYNAMIC SPECTRUM; DYNAMIC SPECTRUM ACCESS; EFFECTIVE SOLUTION; FREQUENCY RANGES; GEOGRAPHIC LOCATION; HARDWARE COST; LICENSED USERS; MISCONFIGURATIONS; MISUSE DETECTION; MISUSE DETECTION SYSTEMS; SPECTRUM PERMITS; TIME DURATION; WIRELESS DEVICES;

EID: 84863553166     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2248371.2248400     Document Type: Conference Paper
Times cited : (33)

References (36)
  • 1
    • 57849154890 scopus 로고    scopus 로고
    • Spectrum enforcement and liability assignment in cognitive radio systems
    • ATIA, G., SAHAI, A., AND SALIGRAMA, V. Spectrum enforcement and liability assignment in cognitive radio systems. In Proc. of IEEE DySPAN (2008).
    • Proc. of IEEE DySPAN (2008)
    • Atia, G.1    Sahai, A.2    Saligrama, V.3
  • 2
    • 46449132666 scopus 로고    scopus 로고
    • Towards an architecture for efficient spectrum slicing
    • BRIK, V., ET AL. Towards an architecture for efficient spectrum slicing. In Proc. of HotMobile (2007).
    • Proc. of HotMobile (2007)
    • Brik, V.1
  • 3
    • 60149092949 scopus 로고    scopus 로고
    • Wireless device identification with radiometric signatures
    • BRIK, V., ET AL. Wireless device identification with radiometric signatures. In Proc. of MobiCom (2008).
    • Proc. of MobiCom (2008)
    • Brik, V.1
  • 5
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan.
    • CHEN, R., PARK, J.-M., AND REED, J. Defense against primary user emulation attacks in cognitive radio networks. IEEE JSAC (Jan. 2008), 25 -37.
    • (2008) IEEE JSAC , pp. 25-37
    • Chen, R.1    Park, J.-M.2    Reed, J.3
  • 6
    • 71049178173 scopus 로고    scopus 로고
    • Transient-based identification of wireless sensor nodes
    • DANEV, B., AND CAPKUN, S. Transient-based identification of wireless sensor nodes. In Proc. of IPSN (2009).
    • Proc. of IPSN (2009)
    • Danev, B.1    Capkun, S.2
  • 7
    • 84863550859 scopus 로고    scopus 로고
    • Attacks on physical-layer identification
    • DANEV, B., ET AL. Attacks on physical-layer identification. In Proc. of WiSec (2010).
    • Proc. of WiSec (2010)
    • Danev, B.1
  • 8
    • 0035246117 scopus 로고    scopus 로고
    • Reliable communication over channels with insertions, deletions, and substitutions
    • Feb.
    • DAVEY, M., AND MACKAY, D. Reliable communication over channels with insertions, deletions, and substitutions. IEEE Trans. on Information Theory 47, 2 (Feb. 2001), 687 -698.
    • (2001) IEEE Trans. on Information Theory , vol.47 , Issue.2 , pp. 687-698
    • Davey, M.1    Mackay, D.2
  • 11
    • 0024057362 scopus 로고
    • Signal interception: A unifying theoretical framework for feature detection
    • GARDNER, W. A. Signal interception: a unifying theoretical framework for feature detection. IEEE Trans. on Commun. 36, 8 (1988), 897-906.
    • (1988) IEEE Trans. on Commun. , vol.36 , Issue.8 , pp. 897-906
    • Gardner, W.A.1
  • 12
    • 33749154671 scopus 로고    scopus 로고
    • Difficulties in providing certification and assurance for software defined radios
    • GIACOMONI, J., AND SICKER, D. Difficulties in providing certification and assurance for software defined radios. In Proc. of IEEE DySPAN (2005).
    • Proc. of IEEE DySPAN (2005)
    • Giacomoni, J.1    Sicker, D.2
  • 13
    • 84923996598 scopus 로고    scopus 로고
    • Cambridge University Press, New York, NY, USA
    • GOLDSMITH, A. Wireless Communications. Cambridge University Press, New York, NY, USA, 2005.
    • (2005) Wireless Communications
    • Goldsmith, A.1
  • 14
    • 78649240359 scopus 로고    scopus 로고
    • Airblue: A system for cross-layer wireless protocol development and experimentation
    • GUMMADI, R., NG, M., FLEMING, K., AND BALAKRISHNAN, H. Airblue: A system for cross-layer wireless protocol development and experimentation. In MIT Tech. Report (2008).
    • (2008) MIT Tech. Report
    • Gummadi, R.1    Ng, M.2    Fleming, K.3    Balakrishnan, H.4
  • 15
    • 78149302549 scopus 로고    scopus 로고
    • Predictable 802.11 packet delivery from wireless channel measurements
    • HALPERIN, D., ET AL. Predictable 802.11 packet delivery from wireless channel measurements. In Proc. of SIGCOMM (2010).
    • Proc. of SIGCOMM (2010)
    • Halperin, D.1
  • 17
    • 84863539107 scopus 로고    scopus 로고
    • IEEE 802.11
    • IEEE 802.11. http://www.ieee802.org/11/.
  • 18
    • 4544248818 scopus 로고    scopus 로고
    • Radio frequency watermarking for OFDM wireless networks
    • KLEIDER, J., ET AL. Radio frequency watermarking for OFDM wireless networks. In Proc. of IEEE ICASSP (2004).
    • Proc. of IEEE ICASSP (2004)
    • Kleider, J.1
  • 19
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • LAMPORT, L. Password authentication with insecure communication. Comm. of the ACM 24, 11 (Nov 1981).
    • (1981) Comm. of the ACM , vol.24 , pp. 11
    • Lamport, L.1
  • 20
    • 33144460850 scopus 로고    scopus 로고
    • Serloc: Secure range-independent localization for wireless sensor networks
    • LAZOS, L., AND POOVENDRAN, R. Serloc: secure range-independent localization for wireless sensor networks. In Proc. of WiSe (2004).
    • Proc. of WiSe (2004)
    • Lazos, L.1    Poovendran, R.2
  • 22
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users'signals in cognitive radio networks via integrated cryptographic and wireless link signatures
    • LIU, Y., NING, P., AND DAI, H. Authenticating primary users'signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In Proc. of IEEE S&P (2010).
    • Proc. of IEEE S&P (2010)
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 23
    • 0002586876 scopus 로고
    • A digital signature based on a conventional encryption function
    • MERKLE, R. A digital signature based on a conventional encryption function. In Proc. of Crypto (1987).
    • (1987) Proc. of Crypto
    • Merkle, R.1
  • 24
    • 0002741922 scopus 로고    scopus 로고
    • Efficient and secure source authentication for multicast
    • PERRIG, A., ET AL. Efficient and secure source authentication for multicast. In Proc. of NDSS (2001).
    • Proc. of NDSS (2001)
    • Perrig, A.1
  • 25
    • 60149094530 scopus 로고    scopus 로고
    • Assessment of urban-scale wireless networks with a small number of measurements
    • ROBINSON, J., ET AL. Assessment of urban-scale wireless networks with a small number of measurements. In Proc. of MobiCom (2008).
    • Proc. of MobiCom (2008)
    • Robinson, J.1
  • 26
    • 51349140478 scopus 로고    scopus 로고
    • Cyclostationary signature detection in multipath rayleigh fading environments
    • SUTTON, P., LOTZE, J., NOLAN, K., AND DOYLE, L. Cyclostationary signature detection in multipath rayleigh fading environments. In Proc. of Crowncom (2007).
    • Proc. of Crowncom (2007)
    • Sutton, P.1    Lotze, J.2    Nolan, K.3    Doyle, L.4
  • 27
    • 38149128324 scopus 로고    scopus 로고
    • Cyclostationary signatures in practical cognitive radio applications
    • Jan.
    • SUTTON, P., NOLAN, K., AND DOYLE, L. Cyclostationary signatures in practical cognitive radio applications. IEEE JSAC (Jan. 2008), 13 -24.
    • (2008) IEEE JSAC , pp. 13-24
    • Sutton, P.1    Nolan, K.2    Doyle, L.3
  • 28
    • 77955036368 scopus 로고    scopus 로고
    • SORA: High performance software radio using general purpose multicore processors
    • TAN, K., ET AL. SORA: High performance software radio using general purpose multicore processors. In Proc. of NSDI (2009).
    • Proc. of NSDI (2009)
    • Tan, K.1
  • 29
    • 39749096536 scopus 로고    scopus 로고
    • Secure location verification with hidden and mobile base stations
    • April
    • ČAPKUN, S., ET AL. Secure location verification with hidden and mobile base stations. IEEE Trans. on Mobile Computing (April 2008), 470-483.
    • (2008) IEEE Trans. on Mobile Computing , pp. 470-483
    • Čapkun, S.1
  • 31
    • 84863538425 scopus 로고    scopus 로고
    • Free Side Channel: Bits over Interference
    • WU, K., ET AL. Free Side Channel: Bits over Interference. In Proc. of MobiCom (2010).
    • Proc. of MobiCom (2010)
    • Wu, K.1
  • 32
    • 78650405865 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • XU, W., ET AL. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of MobiHoc (2005).
    • Proc. of MobiHoc (2005)
    • Xu, W.1
  • 33
    • 48349130414 scopus 로고    scopus 로고
    • TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes
    • XU, W., KAMAT, P., AND TRAPPE, W. TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes. In Proc. of SDR workshop (2006).
    • Proc. of SDR Workshop (2006)
    • Xu, W.1    Kamat, P.2    Trappe, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.