메뉴 건너뛰기




Volumn 102, Issue 3, 2014, Pages 270-281

Security and enforcement in spectrum sharing

Author keywords

Cognitive radio; dynamic spectrum access; enforcement; security; spectrum sharing

Indexed keywords

RADIO SYSTEMS; SPECTROSCOPY;

EID: 84897653172     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2014.2301972     Document Type: Article
Times cited : (78)

References (86)
  • 1
    • 77956621711 scopus 로고    scopus 로고
    • U.S. Federal Communications Commission (FCC) [Online]
    • U.S. Federal Communications Commission (FCC) "National broadband plan: Connecting America, " 2010. [Online]. Available: http://www. broadband.gov/plan/.
    • (2010) National Broadband Plan: Connecting America
  • 11
    • 84858267848 scopus 로고    scopus 로고
    • Developing a standard for TV white space coexistence: Technical challenges and solution approaches
    • Feb.
    • T. Baykas, M. Kasslin, M. Cummings, H. Kang, J. Kwak, R. Paine, A. Reznik, and R. Saeed, "Developing a standard for TV white space coexistence: Technical challenges and solution approaches, " IEEE Wireless Commun., vol. 19, no. 1, pp. 10-22, Feb. 2012.
    • (2012) IEEE Wireless Commun. , vol.19 , Issue.1 , pp. 10-22
    • Baykas, T.1    Kasslin, M.2    Cummings, M.3    Kang, H.4    Kwak, J.5    Paine, R.6    Reznik, A.7    Saeed, R.8
  • 13
  • 15
    • 70349185618 scopus 로고    scopus 로고
    • A survey of spectrum sensing algorithms for cognitive radio applications
    • First Quarter
    • T. Yucek and H. Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications, " IEEE Commun. Surv. Tut., vol. 11, no. 1, pp. 116-130, First Quarter, 2009.
    • (2009) IEEE Commun. Surv. Tut. , vol.11 , Issue.1 , pp. 116-130
    • Yucek, T.1    Arslan, H.2
  • 16
    • 0033171330 scopus 로고    scopus 로고
    • Cognitive radio: Making software radios more personal
    • Aug.
    • J. Mitola, J. Maguire, and G. Q., "Cognitive radio: Making software radios more personal, " IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.
    • (1999) IEEE Pers. Commun. , vol.6 , Issue.4 , pp. 13-18
    • Mitola, J.1    Maguire, J.2
  • 17
    • 84861330060 scopus 로고    scopus 로고
    • Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead
    • 2nd Qtr.
    • G. Baldini, T. Sturman, A. Biswas, R. Leschhorn, G. Godor, and M. Street, "Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead, " IEEE Commun. Surv. Tut., vol. 14, no. 2, pp. 355-379R 2nd Qtr., 2012.
    • (2012) IEEE Commun. Surv. Tut. , vol.14 , Issue.2
    • Baldini, G.1    Sturman, T.2    Biswas, A.3    Leschhorn, R.4    Godor, G.5    Street, M.6
  • 19
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan.
    • R. Chen, J.-M. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks, " IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.-M.2    Reed, J.3
  • 21
    • 79551652585 scopus 로고    scopus 로고
    • Case study: Security analysis of a dynamic spectrum access radio system
    • DOI: 10.1109/GLOCOM.2010.5683726
    • T. Newman, T. Clancy, M. McHenry, and J. Reed, "Case study: Security analysis of a dynamic spectrum access radio system, " in Proc. IEEE Global Telecommun. Conf., 2010, DOI: 10.1109/GLOCOM.2010.5683726.
    • (2010) Proc. IEEE Global Telecommun. Conf.
    • Newman, T.1    Clancy, T.2    McHenry, M.3    Reed, J.4
  • 22
    • 51349154337 scopus 로고    scopus 로고
    • Robust distributed spectrum sensing in cognitive radio networks
    • R. Chen, J.-M. Park, and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks, " in Proc. IEEE Conf. Comput. Commun., 2008, pp. 1876-1884.
    • (2008) Proc. IEEE Conf. Comput. Commun. , pp. 1876-1884
    • Chen, R.1    Park, J.-M.2    Bian, K.3
  • 23
    • 78651372721 scopus 로고    scopus 로고
    • Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
    • Feb.
    • A. Rawat, P. Anand, H. Chen, and P. Varshney, "Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks, " IEEE Trans. Signal Process., vol. 59, no. 2, pp. 774-786, Feb. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.2 , pp. 774-786
    • Rawat, A.1    Anand, P.2    Chen, H.3    Varshney, P.4
  • 24
    • 67349109723 scopus 로고    scopus 로고
    • A survey on MAC protocols for cognitive radio networks
    • C. Cormio and K. R. Chowdhury, "A survey on MAC protocols for cognitive radio networks, " Ad Hoc Netw., vol. 7, no. 7, pp. 1315-1329, 2009.
    • (2009) Ad Hoc Netw. , vol.7 , Issue.7 , pp. 1315-1329
    • Cormio, C.1    Chowdhury, K.R.2
  • 26
    • 78751615533 scopus 로고    scopus 로고
    • Two types of attacks against cognitive radio network MAC protocols
    • L. Zhu and H. Zhou, "Two types of attacks against cognitive radio network MAC protocols, " in Proc. Int. Conf. Comput. Sci. Softw. Eng., 2008, vol. 4, pp. 1110-1113.
    • (2008) Proc. Int. Conf. Comput. Sci. Softw. Eng. , vol.4 , pp. 1110-1113
    • Zhu, L.1    Zhou, H.2
  • 28
    • 34547488337 scopus 로고    scopus 로고
    • Robust detection of selfish misbehavior in wireless networks
    • DOI 10.1109/JSAC.2007.070807
    • A. Toledo and X. Wang, "Robust detection of selfish misbehavior in wireless networks, " IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124-1134, Aug. 2007. (Pubitemid 47171203)
    • (2007) IEEE Journal on Selected Areas in Communications , vol.25 , Issue.6 , pp. 1124-1134
    • Toledo, A.L.1    Wang, X.2
  • 29
    • 33750825847 scopus 로고    scopus 로고
    • DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
    • DOI 10.1109/TMC.2006.183, 1717438
    • M. Raya, I. Aad, J.-P. Hubaux, and A. El Fawal, "DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots, " IEEE Trans. Mobile Comput., vol. 5, no. 12, pp. 1691-1705, Dec. 2006. (Pubitemid 44711828)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.12 , pp. 1691-1705
    • Raya, M.1    Aad, I.2    Hubaux, J.-P.3    El Fawal, A.4
  • 30
    • 79551627245 scopus 로고    scopus 로고
    • Cross-layer attack and defense in cognitive radio networks
    • DOI: 10.1109/GLOCOM.2010.5684069
    • W. Wang, Y. Sun, H. Li, and Z. Han, "Cross-layer attack and defense in cognitive radio networks, " in Proc. IEEE Global Telecommun. Conf., 2010, DOI: 10.1109/GLOCOM.2010.5684069.
    • (2010) Proc. IEEE Global Telecommun. Conf.
    • Wang, W.1    Sun, Y.2    Li, H.3    Han, Z.4
  • 32
    • 84883081776 scopus 로고    scopus 로고
    • Location privacy in database-driven cognitive radio networks: Attacks and counter measures
    • Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao, "Location privacy in database-driven cognitive radio networks: Attacks and counter measures, " in Proc. IEEE INFOCOM, 2013, pp. 2751-2759.
    • (2013) Proc. IEEE INFOCOM , pp. 2751-2759
    • Gao, Z.1    Zhu, H.2    Liu, Y.3    Li, M.4    Cao, Z.5
  • 36
    • 34548759762 scopus 로고    scopus 로고
    • Community-based cognitive radio architecture: Policy-compliant innovation via the semantic web
    • DOI 10.1109/DYSPAN.2007.32, 4221494, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks
    • A. Ginsberg, W. D. Horne, and J. D. Poston, "Community-based cognitive radio architecture: Policy-compliant innovation via the semantic web, " in Proc. 2nd IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw., 2007, pp. 191-201. (Pubitemid 47431652)
    • (2007) 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks , pp. 191-201
    • Ginsberg, A.1    Horne, W.D.2    Poston, J.D.3
  • 37
    • 58049207983 scopus 로고    scopus 로고
    • Policy-based spectrum access control for dynamic spectrum access network radios
    • F. Perich and M. McHenry, "Policy-based spectrum access control for dynamic spectrum access network radios, " Web Semantics, Sci. Services Agents World Wide Web, vol. 7, pp. 21-27, 2009.
    • (2009) Web Semantics, Sci. Services Agents World Wide Web , vol.7 , pp. 21-27
    • Perich, F.1    McHenry, M.2
  • 38
    • 77953201364 scopus 로고    scopus 로고
    • BRESAP: A policy reasoner for processing spectrum access policies represented by binary decision diagrams
    • DOI: 10.1109/DYSPAN.2010.5457867
    • B. Bahrak, A. Deshpande, M. Whitaker, and J. Park, "BRESAP: A policy reasoner for processing spectrum access policies represented by binary decision diagrams, " in Proc. IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw., 2010, DOI: 10.1109/DYSPAN.2010.5457867.
    • (2010) Proc. IEEE Int. Symp. New Frontiers Dyn. Spectrum Access Netw.
    • Bahrak, B.1    Deshpande, A.2    Whitaker, M.3    Park, J.4
  • 39
    • 84863331029 scopus 로고    scopus 로고
    • Spectrum access policy reasoning for policy-based cognitive radios
    • Jul.
    • B. Bahrak, A. Deshpande, and J. Park, "Spectrum access policy reasoning for policy-based cognitive radios, " Comput. Netw., vol. 56, no. 11, pp. 2649-2663, Jul. 2012.
    • (2012) Comput. Netw. , vol.56 , Issue.11 , pp. 2649-2663
    • Bahrak, B.1    Deshpande, A.2    Park, J.3
  • 42
    • 33845443497 scopus 로고    scopus 로고
    • Rule-based and ontology-based policies: Toward a hybrid approach to control agents in pervasive environments
    • Sep.
    • A. Toninelli, J. Bradshaw, L. Kagal, and R. Montanari, "Rule-based and ontology-based policies: Toward a hybrid approach to control agents in pervasive environments, " in Proc. Semantic Web Policy Workshop, Sep. 2005, pp. 42-54.
    • (2005) Proc. Semantic Web Policy Workshop , pp. 42-54
    • Toninelli, A.1    Bradshaw, J.2    Kagal, L.3    Montanari, R.4
  • 44
    • 65249119255 scopus 로고    scopus 로고
    • Language issues for cognitive radio
    • Apr.
    • M. Kokar and L. Lechowicz, "Language issues for cognitive radio, " Proc. IEEE, vol. 97, no. 4, pp. 689-707, Apr. 2009.
    • (2009) Proc. IEEE , vol.97 , Issue.4 , pp. 689-707
    • Kokar, M.1    Lechowicz, L.2
  • 48
    • 80755130139 scopus 로고    scopus 로고
    • Power fingerprinting in SDR integrity assessment for security and regulatory compliance
    • C. R. Aguayo Gonźalez J. H. Reed Dec.
    • C. R. Aguayo Gonźalez and J. H. Reed, "Power fingerprinting in SDR integrity assessment for security and regulatory compliance, " Analog Integr. Circuits Signal Process., vol. 69, no. 2-3, pp. 307-327, Dec. 2011.
    • (2011) Analog Integr. Circuits Signal Process. , vol.69 , Issue.2-3 , pp. 307-327
  • 49
    • 51849103005 scopus 로고    scopus 로고
    • Secure transmission power of cognitive radios for dynamic spectrum access applications
    • X. Li, J. Chen, and F. Ng, "Secure transmission power of cognitive radios for dynamic spectrum access applications, " in Proc. Conf. Inf. Sci. Syst., 2008, pp. 213-218.
    • (2008) Proc. Conf. Inf. Sci. Syst. , pp. 213-218
    • Li, X.1    Chen, J.2    Ng, F.3
  • 51
    • 19944380112 scopus 로고    scopus 로고
    • Database security-concepts, approaches, and challenges
    • Jan.-Mar.
    • E. Bertino and S. Ravi, "Database security-concepts, approaches, and challenges, " IEEE Trans. Depend. Secure Comput., vol. 2, no. 1, pp. 2-19, Jan.-Mar. 2005.
    • (2005) IEEE Trans. Depend. Secure Comput. , vol.2 , Issue.1 , pp. 2-19
    • Bertino, E.1    Ravi, S.2
  • 52
    • 39749182452 scopus 로고    scopus 로고
    • The applicability of the perturbation based privacy preserving data mining for real-world data
    • DOI 10.1016/j.datak.2007.06.011, PII S0169023X07001322
    • L. Li, M. Kantarcioglu, and B. Thuraisingham, "The applicability of the perturbation based privacy preserving data mining for real-world data, " Data Knowl. Eng., vol. 65, no. 1, pp. 5-21, 2008. (Pubitemid 351295928)
    • (2008) Data and Knowledge Engineering , vol.65 , Issue.1 , pp. 5-21
    • Liu, L.1    Kantarcioglu, M.2    Thuraisingham, B.3
  • 56
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, " in Proc. IEEE Symp. Res. Security Privacy, 1998.
    • (1998) Proc. IEEE Symp. Res. Security Privacy
    • Samarati, P.1    Sweeney, L.2
  • 58
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking, " in Proc. 1st Int. Conf. Mobile Syst. Appl. Services, 2003, pp. 31-42.
    • (2003) Proc. 1st Int. Conf. Mobile Syst. Appl. Services , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 61
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • DOI 10.1109/TMC.2007.1062
    • B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms, " IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1-18, Jan. 2008. (Pubitemid 350183929)
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 62
    • 38049181728 scopus 로고    scopus 로고
    • Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting
    • Oct.
    • J. Hall, M. Barbeau, and E. Kranakis, "Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting, " in Proc. Int. Conf. Commun. Comput. Netw., Oct. 2006.
    • (2006) Proc. Int. Conf. Commun. Comput. Netw
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 64
    • 67249119918 scopus 로고    scopus 로고
    • Specific emitter identification for cognitive radio with application to IEEE 802.11
    • DOI: 10.1109/GLOCOM.2008.ECP.404
    • K. Kim, C. Spooner, I. Akbar, and J. Reed, "Specific emitter identification for cognitive radio with application to IEEE 802.11, " in Proc. IEEE Global Telecommun. Conf., 2008, DOI: 10.1109/GLOCOM.2008.ECP.404.
    • (2008) Proc. IEEE Global Telecommun. Conf.
    • Kim, K.1    Spooner, C.2    Akbar, I.3    Reed, J.4
  • 66
  • 69
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communication with side information
    • Jul.
    • I. Cox, M. Miller, and A. McKellips, "Watermarking as communication with side information, " Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.1    Miller, M.2    McKellips, A.3
  • 70
    • 33644995185 scopus 로고    scopus 로고
    • Analysis and design of secure watermark-based authentication systems
    • Mar.
    • C. Fei, D. Kundur, and R. Kwong, "Analysis and design of secure watermark-based authentication systems, " IEEE Trans. Inf. Forens. Security, vol. 1, no. 1, pp. 43-55, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forens. Security , vol.1 , Issue.1 , pp. 43-55
    • Fei, C.1    Kundur, D.2    Kwong, R.3
  • 71
    • 77953185209 scopus 로고    scopus 로고
    • Physical layer authentication watermarks through synthetic channel emulation
    • Apr. DOI: 10.1109/DYSPAN.2010. 5457897
    • N. Goergen, T. Clancy, and T. Newman, "Physical layer authentication watermarks through synthetic channel emulation, " in Proc. IEEE Symp. New Frontiers Dyn. Spectrum, Apr. 2010, DOI: 10.1109/DYSPAN.2010. 5457897.
    • (2010) Proc. IEEE Symp. New Frontiers Dyn. Spectrum
    • Goergen, N.1    Clancy, T.2    Newman, T.3
  • 73
    • 5444259436 scopus 로고    scopus 로고
    • Transmitter identification using embedded pseudo random sequences
    • Sep.
    • X. Wang, Y. Wu, and B. Caron, "Transmitter identification using embedded pseudo random sequences, " IEEE Trans. Broadcast., vol. 50, no. 3, pp. 244-252, Sep. 2004.
    • (2004) IEEE Trans. Broadcast. , vol.50 , Issue.3 , pp. 244-252
    • Wang, X.1    Wu, Y.2    Caron, B.3
  • 74
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • Jul.
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels, " IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 77
    • 80051914579 scopus 로고    scopus 로고
    • Cryptographic link signatures for spectrum usage authentication in cognitive radio
    • Jun.
    • X. Tan, K. Borle, W. Du, and B. Chen, "Cryptographic link signatures for spectrum usage authentication in cognitive radio, " in Proc. 4th ACM Conf. Wireless Netw. Security, Jun. 2011, pp. 79-90.
    • (2011) Proc. 4th ACM Conf. Wireless Netw. Security , pp. 79-90
    • Tan, X.1    Borle, K.2    Du, W.3    Chen, B.4
  • 78
    • 80051889486 scopus 로고    scopus 로고
    • ACE: Authenticating the channel estimation process in wireless communication systems
    • R. Miller and W. Trappe, "ACE: Authenticating the channel estimation process in wireless communication systems, " in Proc. 4th ACM Conf. Wireless Netw. Security, 2011, pp. 91-96.
    • (2011) Proc. 4th ACM Conf. Wireless Netw. Security , pp. 91-96
    • Miller, R.1    Trappe, W.2
  • 79
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
    • May
    • Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures, " in Proc. IEEE Symp. Security Privacy, May 2010, pp. 286-301.
    • (2010) Proc. IEEE Symp. Security Privacy , pp. 286-301
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 86
    • 84880858805 scopus 로고    scopus 로고
    • Enforcing spectrum access rules in cognitive radio networks through cooperative jamming
    • Berlin, Germany: Springer-Verlag
    • K. Ren, X. Liu, W. Liang, M. Xu, X. Jia, and K. Xing, "Enforcing spectrum access rules in cognitive radio networks through cooperative jamming, " in Wireless Algorithms, Systems, and Applications, vol. 7992. Berlin, Germany: Springer-Verlag, 2013, pp. 440-453.
    • (2013) Wireless Algorithms, Systems, and Applications , vol.7992 , pp. 440-453
    • Ren, K.1    Liu, X.2    Liang, W.3    Xu, M.4    Jia, X.5    Xing, K.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.