Localization and Privacy Preservation in Cognitive Radio Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in Cognitive Radio Networks Security in Cognitive Radio Networks

While bringing the potential for solving the spectrum underutilization problem using methods such as dynamic and opportunistic spectrum access, Cognitive Radios (CRs) also bring a set of security issues and potential breaches that have to be addressed. These issues come out mainly from the two important capabilities implemented within CRs: their cognition ability and reconfigurability. This cha...

متن کامل

Privacy Preservation of Affinities in Social Networks

Beyond the ongoing privacy preserving social network studies which mainly focus on node de-identification and link protection, this paper is written with the intention of preserving the privacy of link's affinities, or weights, in a finite and directed social network. To protect the weight privacy of edges, we define a privacy measurement, k-anonymity, over individual weighted edges. It is cons...

متن کامل

Location Data Privacy Preservation in Mobile Networks

Uncontrolled variety of location based service (LBS) applications in mobile networks led to the loss of individual user location data privacy. To preserve privacy in mobile networks data randomization and anonymization must be used because of location data uncertainty. By data randomization additional random data is added to the original location data, desensitizing the precise information cont...

متن کامل

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

Cognitive Radio Communications and Networks

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher's permissions policies and our arrangements with organizations such as t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Multimedia and Ubiquitous Engineering

سال: 2015

ISSN: 1975-0080

DOI: 10.14257/ijmue.2015.10.1.37