Sciweavers

50 search results - page 3 / 10
» Detecting Primary User Emulation Attacks in Dynamic Spectrum...
Sort
View
TWC
2008
225views more  TWC 2008»
13 years 5 months ago
Joint rate and power allocation for cognitive radios in dynamic spectrum access environment
Abstract--We investigate the dynamic spectrum sharing problem among primary and secondary users in a cognitive radio network. We consider the scenario where primary users exhibit o...
Dong In Kim, Long Le, Ekram Hossain
CISS
2008
IEEE
13 years 11 months ago
Sum transmission power of multiple cooperative secondary transmitters in dynamic spectrum access networks
Cognitive radio is a desirable technique for secondary users to utilize the spectrum gray space. In order to avoid intolerable interference to primary users, the transmission powe...
Juite Hwu, Jinying Chen, Xiaohua Li
IMC
2010
ACM
13 years 3 months ago
On the feasibility of effective opportunistic spectrum access
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...
CISS
2008
IEEE
13 years 11 months ago
Secure transmission power of cognitive radios for dynamic spectrum access applications
—One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios...
Xiaohua Li, Jinying Chen, Fan Ng
ICASSP
2008
IEEE
13 years 11 months ago
Power control in spectrum overlay networks: How to cross a multi-lane highway
—We consider power control in spectrum overlay networks (also referred to as opportunistic spectrum access) where secondary users identify and exploit instantaneous and local spe...
Wei Ren, Qing Zhao, Ashwin Swami