Adaptation from Transmission Security (TRANSEC) to Cognitive Radio Communication
نویسندگان
چکیده
Communication systems have to be made secure against unauthorized interception or against disruption or corruption in complicated electromagnetic environments. There are mainly three security categories used to delineate wireless communication systems generally, such as shown in Fig. 1, i.e., INFOSEC, COMSEC, and TRANSEC. We state about information security (INFOSEC) as that trying to against unauthorized access to or modification of information; we describe the communications security (COMSEC) as that keeping important communications secure. And we describe transmission security (TRANSEC) as that making it difficult for someone to intercept or interfere with communications without prior accurate waveforms, modulation schemes, and coding (Nicholson, 1987).
منابع مشابه
Sensate-liner Eplrs Telemetered Data Input for Encompass
A systems engineering development for acquisition, transmission, processing, dissemination and display of information vital to combat casualty care and related first responder activities is presented. It utilizes a synergistic combination of two existing state-of-the-art Defense Advanced Research Projects Agency/Space and Naval Warfare Systems Center San Diego (DARPA/SSCSD) technologies (Sensat...
متن کاملCognitive radio network with secrecy and interference constraints
In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU commun...
متن کاملPerformance Improvement of the Cognitive Radio Networks with User Cooperation
The cognitive radio has been considered as a promising paradigm to achieve efficient spectrum usage by allowing the coexistence of the primary and cognitive radio networks. One fundamental challenge is to ensure the quality of service (QoS) of the primary link while maximizing the achievable transmission rate of the cognitive radio user. In this paper, we investigate the cooperation based spect...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کامل