메뉴 건너뛰기




Volumn 26, Issue , 2015, Pages 172-180

SpecGuard: Spectrum misuse detection in dynamic spectrum access systems

Author keywords

[No Author keywords available]

Indexed keywords

LOCAL AREA NETWORKS; MATLAB; NETWORK LAYERS; RADIO COMMUNICATION; SPECTROSCOPY;

EID: 84954211488     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2015.7218380     Document Type: Conference Paper
Times cited : (22)

References (24)
  • 1
    • 84863553166 scopus 로고    scopus 로고
    • Enforcing dynamic spectrum access with spectrum permits
    • Hilton Head Island, SC, June
    • L. Yang, Z. Zhang, B. Zhao, C. Kruegel, and H. Zheng, "Enforcing dynamic spectrum access with spectrum permits," in ACM MobiHoc'12, Hilton Head Island, SC, June 2012, pp. 195-204.
    • (2012) ACM MobiHoc'12 , pp. 195-204
    • Yang, L.1    Zhang, Z.2    Zhao, B.3    Kruegel, C.4    Zheng, H.5
  • 2
    • 84954171598 scopus 로고    scopus 로고
    • Towards an architecture for efficient spectrum slicing
    • Tucson, AZ, Feb.
    • V. Brik, V. Shrivastava, A. Mishra, and S. Banerjee, "Towards an architecture for efficient spectrum slicing," in HotMobile'07, Tucson, AZ, Feb. 2007, pp. 61-69.
    • (2007) HotMobile'07 , pp. 61-69
    • Brik, V.1    Shrivastava, V.2    Mishra, A.3    Banerjee, S.4
  • 3
    • 48349130414 scopus 로고    scopus 로고
    • TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes
    • Reston, VA, Sept.
    • W. Xu, P. Kamat, and W. Trappe, "TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes," in IEEE Workshop on SDR Networks, Reston, VA, Sept. 2006, pp. 101-109.
    • (2006) IEEE Workshop on SDR Networks , pp. 101-109
    • Xu, W.1    Kamat, P.2    Trappe, W.3
  • 5
    • 70349696172 scopus 로고    scopus 로고
    • ALDO: An anomaly detection framework for dynamic spectrum access networks
    • Brazil, Apr.
    • S. Liu, L. Greenstein, Y. Chen, and W. Trappe, "ALDO: An anomaly detection framework for dynamic spectrum access networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009, pp. 675-683.
    • (2009) IEEE INFOCOM'09, Rio de Janeiro , pp. 675-683
    • Liu, S.1    Greenstein, L.2    Chen, Y.3    Trappe, W.4
  • 6
    • 79951577034 scopus 로고    scopus 로고
    • Cooperative spectrum sensing in cognitive radio networks: A survey
    • Mar.
    • I. Akyildiz, B. Lo, and R. Balakrishnan, "Cooperative spectrum sensing in cognitive radio networks: A survey," Physical Communication, vol. 4, no. 1, pp. 40-62, Mar. 2011.
    • (2011) Physical Communication , vol.4 , Issue.1 , pp. 40-62
    • Akyildiz, I.1    Lo, B.2    Balakrishnan, R.3
  • 7
    • 51349154337 scopus 로고    scopus 로고
    • Robust distributed spectrum sensing in cognitive radio networks
    • Apr.
    • R. Chen, J. Park, and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks," in INFOCOM'08, Apr. 2008, pp. 1876-1884.
    • (2008) INFOCOM'08 , pp. 1876-1884
    • Chen, R.1    Park, J.2    Bian, K.3
  • 8
    • 84861582938 scopus 로고    scopus 로고
    • Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
    • Orlando, FL, Mar.
    • Q. Yan, M. Li, T. Jiang, W. Lou, and Y. Hou, "Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks," in INFOCOM'12, Orlando, FL, Mar. 2012.
    • (2012) INFOCOM'12
    • Yan, Q.1    Li, M.2    Jiang, T.3    Lou, W.4    Hou, Y.5
  • 9
    • 84883085274 scopus 로고    scopus 로고
    • Secure crowdsourcing-based cooperative spectrum sensing
    • Turin, Italy, Apr.
    • R. Zhang, et al., "Secure crowdsourcing-based cooperative spectrum sensing," in INFOCOM'13, Turin, Italy, Apr. 2013, pp. 2526-2534.
    • (2013) INFOCOM'13 , pp. 2526-2534
    • Zhang, R.1
  • 10
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • Jan.
    • R. Chen, J. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE JSAC, vol.26, no.1, pp. 25-37, Jan. 2008.
    • (2008) IEEE JSAC , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.2    Reed, J.3
  • 11
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
    • Oakland, CA, May
    • Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in S&P'10, Oakland, CA, May 2010, pp. 286-301.
    • (2010) S&P'10 , pp. 286-301
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 12
    • 80051914579 scopus 로고    scopus 로고
    • Cryptographic link signatures for spectrum usage authentication in cognitive radio
    • Hamburg, Germany, June
    • X. Tan, K. Borle, W. Du, and B. Chen, "Cryptographic link signatures for spectrum usage authentication in cognitive radio," in WiSec'11, Hamburg, Germany, June 2011, pp. 79-90.
    • (2011) WiSec'11 , pp. 79-90
    • Tan, X.1    Borle, K.2    Du, W.3    Chen, B.4
  • 13
    • 84890537838 scopus 로고    scopus 로고
    • A physical layer authentication scheme for countering primary user emulation attack
    • Vancouver, Canada, May
    • K. Borle, B. Chen, and W. Du, "A physical layer authentication scheme for countering primary user emulation attack," in ICASSP'13, Vancouver, Canada, May 2013, pp. 2935-2939.
    • (2013) ICASSP'13 , pp. 2935-2939
    • Borle, K.1    Chen, B.2    Du, W.3
  • 14
    • 84874426137 scopus 로고    scopus 로고
    • Secret agent radio: Covert communication through dirty constellations
    • Berkeley, CA, May
    • A. Dutta, D. Saha, D. Grunwald, and D. Sicker, "Secret agent radio: Covert communication through dirty constellations," in IH'12, Berkeley, CA, May 2012, pp. 160-175.
    • (2012) IH'12 , pp. 160-175
    • Dutta, A.1    Saha, D.2    Grunwald, D.3    Sicker, D.4
  • 15
    • 84893562953 scopus 로고    scopus 로고
    • PHY-layer authentication by introducing controlled inter symbol interference
    • Washington, D. C. , Oct.
    • V. Kumar, J. M. Park, T. C. Clancy, and B. Kaigui, "PHY-layer authentication by introducing controlled inter symbol interference," in CNS'13, Washington, D.C., Oct. 2013, pp. 10-18.
    • (2013) CNS'13 , pp. 10-18
    • Kumar, V.1    Park, J.M.2    Clancy, T.C.3    Kaigui, B.4
  • 17
    • 77953213173 scopus 로고    scopus 로고
    • Secure collaborative sensing for crowd sourcing spectrum data in white space networks
    • Singapore, Apr.
    • O. Fatemieh, R. Chandra, and C. Gunter, "Secure collaborative sensing for crowd sourcing spectrum data in white space networks," in DySPAN' 10, Singapore, Apr. 2010, pp. 1-12.
    • (2010) DySPAN' 10 , pp. 12
    • Fatemieh, O.1    Chandra, R.2    Gunter, C.3
  • 18
    • 79251602150 scopus 로고    scopus 로고
    • Detection of small-scale primary users in cognitive radio networks
    • Feb.
    • A. Min, X. Zhang, and K. Shin, "Detection of small-scale primary users in cognitive radio networks," IEEE JSAC, vol. 29, no. 2, pp. 349-361, Feb. 2011.
    • (2011) IEEE JSAC , vol.29 , Issue.2 , pp. 349-361
    • Min, A.1    Zhang, X.2    Shin, K.3
  • 19
    • 84954275871 scopus 로고    scopus 로고
    • "SHA-1," http://en.wikipedia.org/wiki/SHA-1, [Online].
  • 20
    • 77953882941 scopus 로고    scopus 로고
    • The transport layer security (TLS) protocol
    • Apr.
    • T. Dierks and E. Rescorla, "The transport layer security (TLS) protocol," RFC 4346, Apr. 2006.
    • (2006) RFC 4346
    • Dierks, T.1    Rescorla, E.2
  • 22
    • 0035669989 scopus 로고    scopus 로고
    • A comparison of pilot-aided channel estimation methods for OFDM systems
    • Dec.
    • M. Morelli and U. Mengali, "A comparison of pilot-aided channel estimation methods for ofdm systems," Signal Processing, IEEE Transactions on, vol. 49, no. 12, pp. 3065-3073, Dec. 2001.
    • (2001) Signal Processing, IEEE Transactions on , vol.49 , Issue.12 , pp. 3065-3073
    • Morelli, M.1    Mengali, U.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.