نتایج جستجو برای: spectrum sensing data falsification attack
تعداد نتایج: 2736404 فیلتر نتایج به سال:
Methods for analyzing the resistance of large woodlands (such as Siberian taiga forests) to insect attacks based on remote sensing data are proposed. As an indicator woodland’s resistance, we suggest a function normalized difference vegetative index (NDVI) susceptibility changes in land surface temperature (LST). Both NDVI and LST obtained via TERRA/AQUA satellite system. This was calculated sp...
Due to the unavoidable use of mobile phone and another data communication as a result we face the problem of spectrum scarcity. Within the current spectrum regulatory framework, however, all of the frequency bands are exclusively allocated to specific services and no violation from unlicensed users is allowed.But as we know that most of the time band is either not utilized or underutilized. The...
Recently, a new blind spectrum sensing technique based on signal space dimension estimation was developed for sensing the spectrum holes in the primary user’s bands. The mean idea of this technique is that the number of significant eigenvalues of the covariance matrix of the received signal is directly related to the presence/absence of data in the signal. In this paper, we study the collaborat...
An adversarial deep learning approach is presented to launch over-the-air spectrum poisoning attacks. A transmitter applies on its sensing results predict idle time slots for data transmission. In the meantime, an adversary learns transmitter's behavior (exploratory attack) by building another neural network when transmissions will succeed. The falsifies (poisons) over air transmitting during s...
We propose a distributed spectrum decision protocol resilient to primary user emulation attacks (PUEA) in dynamic spectrum access (DSA) networks. PUEA is a type of denialof-service attack that can result in unreliable and/or disconnected DSA networks by depriving legitimate secondary users of spectrum access. We first propose an individual detection mechanism for secondary users to achieve prel...
In this paper, a two step secure spectrum sensing algorithm is proposed for cognitive radio networks. In this algorithm, the sensing results of secondary users are pre-filtered and applying fuzzy logic, so, the overall sensing performance of the network is improved. To determine pre-filter parameters, statistical parameters of the sensing results are used to remove those sensing results which a...
Falsification may demarcate science from non-science as the rational way to test the truth of hypotheses. But experimental evidence from studies of reasoning shows that people often find falsification difficult. We suggest that domain expertise may facilitate falsification. We consider new experimental data about chess experts’ hypothesis testing. The results show that chess masters were readil...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید