Sciweavers

405 search results - page 55 / 81
» Securing cognitive radio networks
Sort
View
MONET
2006
88views more  MONET 2006»
13 years 8 months ago
Introducing consciousness in UWB networks by hybrid modelling of admission control
Abstract We formalize a model for a self-organizing network of nodes that operate according to the UWB principle based on hybrid modelling formalism. We design the rules that lead ...
Maria-Gabriella Di Benedetto, Guerino Giancola, Ma...
AC
2004
Springer
13 years 8 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
CCN
2006
278views Communications» more  CCN 2006»
13 years 10 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
JSAC
2006
174views more  JSAC 2006»
13 years 8 months ago
Integrated Radio Resource Allocation for Multihop Cellular Networks With Fixed Relay Stations
Recently, the notion that a logical next step towards future mobile radio networks is to introduce multihop relaying into cellular networks, has gained wide acceptance. Nevertheles...
Yajian Liu, Reza Hoshyar, X. Yang, Rahim Tafazolli
INFOCOM
2009
IEEE
14 years 3 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...