نتایج جستجو برای: spectrum sensing data falsification attack

تعداد نتایج: 2736404  

2014
V. Jayasree

Cognitive radio is one of the main technologies in the wireless communications. The cognitive radio networks are composed of cognitive, spectrum-agile devices which is able to modify their network configurations according to the spectral environment. This cognitive radio provides the chance reusing portions of the spectrum temporarily for the secondary users. But security is a main issue in the...

Journal: :IEICE Transactions 2012
Yosuke Todo Yuki Ozawa Toshihiro Ohigashi Masakatu Morii

In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPATKIP). A previous realistic attack succeeds only for a network that supports IEEE 802.11e QoS features by both an access point (AP) and a client, and it has an execution time of 12–15min, in which it recovers a message integrity code (MIC) key from an ARP packet. Our first ...

2010
Awais Khawar Charles Clancy

Title: Spectrum Sensing Security in Cognitive Radio Networks Awais Khawar, Master of Science, 2010 Supervisor: Dr. Charles Clancy Department of Electrical and Computer Engineering This thesis explores the use of unsupervised machine learning for spectrum sensing in cognitive radio (CR) networks from a security perspective. CR is an enabling technology for dynamic spectrum access (DSA) because o...

2014
Takeshi Matsuda

SQL injection is an attack of type to insert malicious query via an input form on web site. If SQL injection attack were successful, there are the threats of unauthorized access, information leak or falsification of data for web applications driven database system. In the conventional studies, a lot of prevention and detection methods using pattern matching, parsing or machine learning have bee...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم پایه 1392

a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...

Journal: :Symmetry 2022

The Internet of Vehicles (IoV) is witnessed to play the leading role in future Intelligent Transportation Systems (ITS). Though many works have focused on IoV improvement, there still a lack performance due insufficient spectrum availability, lower data rates, and involvement attackers. This paper considers all three issues by developing novel mmWave-assisted Cognitive Radio based (CR-IoV) mode...

2011
WENKAI WANG

It is well known that cyber security plays a critical role in ensuring functionality and reliability of increasingly ubiquitous communication systems and critical infrastructures. Compared with the traditional attacks that target individual users, protocols, or components in the complicated systems, the emerging attacks can 1) exploit collaboration among multiple users or network nodes, 2) expl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید