Marcelo Camilo, D. Moura, J. F. Galdino, R. Salles
{"title":"认知无线电网络的抗干扰防御机制","authors":"Marcelo Camilo, D. Moura, J. F. Galdino, R. Salles","doi":"10.1109/MILCOM.2012.6415653","DOIUrl":null,"url":null,"abstract":"Cognitive Radio is a technology that enables the spectrum sharing in an opportunistic fashion. However, as the development of cognitive radio technology occurs, its security problems like jamming arise. In this paper, we studied the jamming attack in cognitive radio networks. We sketched a scenario comprised by a primary user, a secondary user, and a spectrum jammer (namely attacker). Since the legitimate secondary user needs to transmit control messages and data in the available channels, we derived the best combinations of the number of control and data channels to the legitimate secondary user in face of different data applications considering the quality of service requirements reliability and throughput. We also considered the device with and without power constraints.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"13 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Anti-jamming defense mechanism in cognitive radios networks\",\"authors\":\"Marcelo Camilo, D. Moura, J. F. Galdino, R. Salles\",\"doi\":\"10.1109/MILCOM.2012.6415653\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cognitive Radio is a technology that enables the spectrum sharing in an opportunistic fashion. However, as the development of cognitive radio technology occurs, its security problems like jamming arise. In this paper, we studied the jamming attack in cognitive radio networks. We sketched a scenario comprised by a primary user, a secondary user, and a spectrum jammer (namely attacker). Since the legitimate secondary user needs to transmit control messages and data in the available channels, we derived the best combinations of the number of control and data channels to the legitimate secondary user in face of different data applications considering the quality of service requirements reliability and throughput. We also considered the device with and without power constraints.\",\"PeriodicalId\":18720,\"journal\":{\"name\":\"MILCOM 2012 - 2012 IEEE Military Communications Conference\",\"volume\":\"13 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2012 - 2012 IEEE Military Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2012.6415653\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2012 - 2012 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2012.6415653","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Anti-jamming defense mechanism in cognitive radios networks
Cognitive Radio is a technology that enables the spectrum sharing in an opportunistic fashion. However, as the development of cognitive radio technology occurs, its security problems like jamming arise. In this paper, we studied the jamming attack in cognitive radio networks. We sketched a scenario comprised by a primary user, a secondary user, and a spectrum jammer (namely attacker). Since the legitimate secondary user needs to transmit control messages and data in the available channels, we derived the best combinations of the number of control and data channels to the legitimate secondary user in face of different data applications considering the quality of service requirements reliability and throughput. We also considered the device with and without power constraints.