نتایج جستجو برای: spectrum sensing data falsification attack
تعداد نتایج: 2736404 فیلتر نتایج به سال:
Spectrum sensing is an important functional unit of the cognitive radio networks. The spectrum sensing is one of the main challenges encountered by cognitive radio. This paper presents a survey of spectrum sensing techniques and they are studied from a cognitive radio perspective. The challenges that go with spectrum sensing are reviewed. Two sensing schemes, namely; cooperative sensing and eig...
A latest communication technology named “Cognitive Radio Network” is a network in which an un-licensed user can use a freed channel in a spectrum band of licensed user. One of the spectrum management functions is spectrum sensing which the most critical function in the entire communication. If there will be any discrepancy in its functioning then the entire network will be disturbed which would...
we design a novel nano-ring resonator using two-dimensional photonic crystal (2d-phc), for bio-sensing applications. the structure of biosensor is created by two-curve-shaped ring resonator which sandwiched by two waveguides. these are configured by removing one row of air holes. the refractive index of sensing hole is changed by binding an analyte. hence, intensity of the transmission spectrum...
Probabilistic packet marking (PPM) is a technique designed to identify packet traffic sources with low storage and processing overhead on network routers. In most previous PPM approaches, individual path messages carry only partial path information. These methods are susceptible to “path falsification” attacks, which greatly reduce their effectiveness. This work proposes a path-falsification-at...
Integrated sensing and communication is a novel paradigm using crowdsensing spectrum sensors to help with the management of scarcity. However, well-known vulnerabilities resource-constrained possibility being manipulated by users physical access complicate their protection against data falsification (SSDF) attacks. Most recent literature suggests behavioral fingerprinting Machine/Deep Learning ...
Nodes in the DTN work on the foundation of cooperation in the network. When working in a cooperative manner, these nodes consume some network resources like bandwidth, buffer space etc. Like any other networks, DTNs are also prone to the malicious nodes and different attacks. In this work, we have proposed an attack model comprising of falsification of extended routing protocol metadata informa...
Cognitive radio technology (CR), as a key enabling functionality for the next generation (xG) mobile communication, can remarkably improve the performance of a wireless communication system by being aware of the changes of its surrounding and dynamically modifying its operating parameters to adapt such changes. Recently, the security issues of cognitive radio (CR) networks have drawn more and m...
Smart grids are the cutting-edge electric power systems that make use of latest digital communication technologies to supply end-user electricity, but with more effective control and can completely fill end user demand. Advanced Metering Infrastructure (AMI), backbone smart grids, be used provide a range applications services based on AMI data. The increased deployment meters have attracted att...
Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new w...
Scientific misconduct has been defined as fabrication, falsification, and plagiarism. Scientific misconduct has occurred throughout the history of science. The US government began to take systematic interest in such misconduct in the 1980s. Since then, a number of studies have examined how frequently individual scientists have observed scientific misconduct or were involved in it. Although the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید