Anti-Jamming Transmissions in Cognitive Radio Networks

Anti-Jamming Transmissions in Cognitive Radio Networks
Author: Liang Xiao
Publisher: Springer
Total Pages: 83
Release: 2015-11-07
Genre: Computers
ISBN: 331924292X


Download Anti-Jamming Transmissions in Cognitive Radio Networks Book in PDF, Epub and Kindle

This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game theoretic solutions to suppress jamming incentives in CRNs. Later chapters evaluate the Nash equilibrium and Stackelberg equilibrium of the jamming games under various network scenarios. Professionals and researchers working in networks, wireless communications and information technology will find Anti-Jamming Transmissions in Cognitive Radio Networks valuable material as a reference. Advanced-level students studying electrical engineering and computer science will also find this brief a useful tool.

Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks

Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks
Author: Nadia Adem
Publisher:
Total Pages: 94
Release: 2016
Genre: Cognitive radio networks
ISBN:


Download Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks Book in PDF, Epub and Kindle

Cognitive radio technology emerges as a promising solution for overcoming shortage and inefficient use of spectrum resources. In cognitive radio networks, secondary users, which are users equipped with cognitive radios, can opportunistically access spectrum assigned to primary users, the spectrum license holders. Although it improves spectrum utilization efficiency, this opportunistic spectrum access incurs undesired delays that can degrade the quality of service (QoS) of delay-sensitive applications substantially. It is therefore important to understand, model, and characterize these delays, as well as their dependency on primary user behaviors. Moreover, the lack of access priority leads to significant performance degradation when the network is under jamming attacks. It turns out that addressing jamming attacks while maintaining a desired QoS is very challenging. In this thesis, we characterize the properties of the random process that describes the availability of the opportunistic resources, and analytically model and analyze cognitive network average delays. Furthermore, we propose and study new techniques that mitigate jamming attacks in mobile cognitive radio networks. More specifically, this thesis consists of the following three complimentary frameworks: Bechir Hamdaoui 1. Stochastic Resource Availability Modeling and Delay Analysis. In this framework, we define and characterize the properties of the random process that describes the availability of the opportunistic network resources. We apply the mean residual service time concept to derive an analytical solution for the cognitive network queueing delay. We model the service mechanism, and determine the manner in which it depends on spectrum availability. We show that the delay becomes unbounded if spectrum dynamics are not carefully considered in network design. 2. Mitigating Jamming through Pseudorandom Time Hopping. In this framework, we propose and evaluate jamming countermeasure approaches for mobile cognitive users. We propose two time-based techniques which, unlike other existing frequency-based techniques, do not assume accessibility to multiple channels and hence do not rely on spectrum handoff to countermeasure jamming. In these two techniques, we allocate data over time based on cryptographic and estimation methods. We derive analytical expressions of the jamming, switching and error probabilities. Our findings show that our proposed technique outperforms other existing frequency-based techniques. 3. Optimally Controlled Time-Hopping Anti-Jamming Technique. In this framework, we propose a jamming and environment aware resource allocation method for mobile cognitive users. We propose to mitigate jamming based on an optimal allocation of data over time. In addition, we optimally control network mobility to meet a desired QoS. Our findings show that our proposed technique achieves better QoS than those achieved by existing cryptographic methods while not compromising jamming resiliency.

Machine Learning and Intelligent Communications

Machine Learning and Intelligent Communications
Author: Xiangping Bryce Zhai
Publisher: Springer Nature
Total Pages: 795
Release: 2019-10-27
Genre: Computers
ISBN: 3030323889


Download Machine Learning and Intelligent Communications Book in PDF, Epub and Kindle

This volume constitutes the refereed post-conference proceedings of the Fourth International Conference on Machine Learning and Intelligent Communications, MLICOM 2019, held in Nanjing, China, in August 2019. The 65 revised full papers were carefully selected from 114 submissions. The papers are organized thematically in machine learning, intelligent positioning and navigation, intelligent multimedia processing and security, wireless mobile network and security, cognitive radio and intelligent networking, IoT, intelligent satellite communications and networking, green communication and intelligent networking, ad-hoc and sensor networks, resource allocation in wireless and cloud networks, signal processing in wireless and optical communications, and intelligent cooperative communications and networking.

Dynamic Games for Network Security

Dynamic Games for Network Security
Author: Xiaofan He
Publisher: Springer
Total Pages: 82
Release: 2018-02-28
Genre: Technology & Engineering
ISBN: 3319758713


Download Dynamic Games for Network Security Book in PDF, Epub and Kindle

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.

Emerging Technologies in Data Mining and Information Security

Emerging Technologies in Data Mining and Information Security
Author: João Manuel R. S. Tavares
Publisher: Springer Nature
Total Pages: 994
Release: 2021-05-04
Genre: Technology & Engineering
ISBN: 981159774X


Download Emerging Technologies in Data Mining and Information Security Book in PDF, Epub and Kindle

This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of things (IoT), and information security.

Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019

Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019
Author: Aboul Ella Hassanien
Publisher: Springer Nature
Total Pages: 1093
Release: 2019-10-02
Genre: Technology & Engineering
ISBN: 3030311295


Download Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019 Book in PDF, Epub and Kindle

This book presents the proceedings of the 5th International Conference on Advanced Intelligent Systems and Informatics 2019 (AISI2019), which took place in Cairo, Egypt, from October 26 to 28, 2019. This international and interdisciplinary conference, which highlighted essential research and developments in the fields of informatics and intelligent systems, was organized by the Scientific Research Group in Egypt (SRGE). The book is divided into several sections, covering the following topics: machine learning and applications, swarm optimization and applications, robotic and control systems, sentiment analysis, e-learning and social media education, machine and deep learning algorithms, recognition and image processing, intelligent systems and applications, mobile computing and networking, cyber-physical systems and security, smart grids and renewable energy, and micro-grid and power systems.

Cognitive Radio-Oriented Wireless Networks

Cognitive Radio-Oriented Wireless Networks
Author: Giuseppe Caso
Publisher: Springer Nature
Total Pages: 193
Release: 2021-03-30
Genre: Computers
ISBN: 3030734234


Download Cognitive Radio-Oriented Wireless Networks Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 15th International Conference on Cognitive Radio-Oriented Wireless Networks, CROWNCOM 2020, held in Rome, Italy, in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 13 revised full papers were selected from 28 submissions and present all major technical aspects related to cognitive radio and networks. The papers are organized in four sessions: spectrum sensing and environment awareness; resource sharing and optimization; verticals and applications; business models and spectrum management.

Cognitive Radio Networks

Cognitive Radio Networks
Author: Kwang-Cheng Chen
Publisher: John Wiley & Sons
Total Pages: 372
Release: 2009-03-30
Genre: Technology & Engineering
ISBN: 9780470742013


Download Cognitive Radio Networks Book in PDF, Epub and Kindle

Giving a basic overview of the technologies supporting cognitive radio this introductory-level text follows a logical approach, starting with the physical layer and concluding with applications and general issues. It provides a background to advances in the field of cognitive radios and a new exploration of how these radios can work together as a network. Cognitive Radio Networks starts with an introduction to the fundamentals of wireless communications, introducing technologies such as OFDM & MIMO. It moves onto cover software defined radio and explores and contrasts wireless, cooperative and cognitive networks and communications. Spectrum sensing, medium access control and network layer design are examined before the book concludes by covering the topics of trusted cognitive radio networks and spectrum management. Unique in providing a brief but clear tutorial and reference to cognitive radio networks this book is a single reference, written at the appropriate level for newcomers as well as providing an encompassing text for those with more knowledge of the subject. One of the first books to provide a systematic description of cognitive radio networks Provides pervasive background knowledge including both wireless communications and wireless networks Written by leading experts in the field Full network stack investigation

Robust and Secure Spectrum Sensing in Cognitive Radio Networks

Robust and Secure Spectrum Sensing in Cognitive Radio Networks
Author: Changlong Chen
Publisher:
Total Pages: 103
Release: 2013
Genre: Cognitive radio networks
ISBN:


Download Robust and Secure Spectrum Sensing in Cognitive Radio Networks Book in PDF, Epub and Kindle

With wireless devices and applications booming, the problem of inefficient utilization of the precious radio spectrum has arisen. Cognitive radio is a key technology to improve spectrum utilization. A major challenge in cognitive radio networks is spectrum sensing, which detects if a spectrum band is being used by a primary user. Spectrum sensing plays a critical role in cognitive radio networks. However, spectrum sensing is vulnerable to security attacks from malicious users. In this dissertation, we propose a malicious user detection scheme, a density based SSDF detection scheme, a conjugate prior based SSDF detection scheme, and an anti-jamming algorithm to achieve robust and secure cooperative spectrum sensing in cognitive radio networks. Performance analysis and simulation results show that our proposed schemes can achieve very good performance in detecting malicious users, excluding abnormal sensing reports, and defending the jamming attack, thus improve spectrum sensing performance in cognitive radio networks.

Advances in Cognitive Radio Systems

Advances in Cognitive Radio Systems
Author: Cheng-Xiang Wang
Publisher: BoD – Books on Demand
Total Pages: 158
Release: 2012-07-05
Genre: Technology & Engineering
ISBN: 953510666X


Download Advances in Cognitive Radio Systems Book in PDF, Epub and Kindle

Cognitive radio technologies are forms of wireless communication with many and varied applications. The contributions in this book will benefit researchers and engineers as they offer cutting-edge knowledge in the field. Subjects include uses of wideband voltage controlled oscillators, control planes for spectrum access and mobility in networks with heterogeneous frequency devices. Other chapters cover cognitive media access control and measurement methods for spectrum occupancy. In addition, there are contributions on delay analysis and channel selection in single-hop networks for delay-sensitive applications, the application of transmission security (TRANSEC) protocols to cognitive radio communication and the use of blind detection, parameters, estimation and the despreading of DS-CDMA signals in multirate, multiuser cognitive radio systems.