نتایج جستجو برای: spectrum sensing data falsification attack

تعداد نتایج: 2736404  

2009
Zaw Htike Choong Seon Hong

Radio jamming attack is the most effective and easiest Denial-of –Service (DOS) attack in wireless network. In this paper, we proposed a multi-channel MAC protocol to mitigate the jamming attacks by using cognitive radio. The Cognitive Radio (CR) technology supports real-time spectrum sensing and fast channel switching. By using CR technologies, the legitimate nodes can perform periodic spectru...

Journal: :IEICE Transactions 2011
Masakatu Morii Yosuke Todo

In recent years, wireless LAN systems are widely used in campuses, offices, homes and so on. It is important to discuss the security aspect of wireless LAN networks in order to protect data confidentiality and integrity. The IEEE Standards Association formulated some security protocols, for example, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-T...

2014
Muhammad Usman Insoo Koo

Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low ...

2009
Toshihiro Ohigashi Masakatu Morii

In 2008, Beck and Tews have proposed a practical attack on WPA. Their attack (called the Beck-Tews attack) can recover plaintext from an encrypted short packet, and can falsify it. The execution time of the Beck-Tews attack is about 12-15 minutes. However, the attack has the limitation, namely, the targets are only WPA implementations those support IEEE802.11e QoS features. In this paper, we pr...

2014
Yufang Cheng Jian Zhou

Cognitive-radio (CR) technology is to solve the spectrum scarcity problem, make accessible supplementary spectrum bands required for the data transmission in mobile ad hoc networks (MANET) and provide an appropriate level of security for CR networks received far less attention than other areas regarding to common key management schemes for MANET as well. Key management and authentication are tw...

Journal: :Nature Human Behaviour 2020

Journal: :IEEE Journal on Selected Areas in Communications 2012

Journal: :International Journal of Security and Its Applications 2016

2013
Deepa Das Susmita Das

Cognitive radio is a promising technology aiming to solve the spectrum scarcity problem by allocating the spectrum dynamically to unlicensed users. It uses the free spectrum bands which are not being used by the licensed users without causing interference to the incumbent transmission. So, spectrum sensing is the essential mechanism on which the entire communication depends. If the spectrum sen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید