2021
DOI: 10.1109/jiot.2021.3064583
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and New Directions in Securing Spectrum Access Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 82 publications
0
11
0
Order By: Relevance
“…Weaknesses in communication protocols [18] can be exploited to intercept or alter data flow between RL agents and their environments, compromising the decision-making process. The dependence on wireless communications exposes RL systems to spectrum-based attacks [30,43,41,42], such as jamming or spoofing [29], potentially crippling their functionality. Moreover, the involvement of untrusted or compromised service providers magnifies the threat landscape, facilitating malicious activities like data tampering or unauthorized data access [45,7,6].…”
Section: Adversarial Examples Attack and Defensementioning
confidence: 99%
“…Weaknesses in communication protocols [18] can be exploited to intercept or alter data flow between RL agents and their environments, compromising the decision-making process. The dependence on wireless communications exposes RL systems to spectrum-based attacks [30,43,41,42], such as jamming or spoofing [29], potentially crippling their functionality. Moreover, the involvement of untrusted or compromised service providers magnifies the threat landscape, facilitating malicious activities like data tampering or unauthorized data access [45,7,6].…”
Section: Adversarial Examples Attack and Defensementioning
confidence: 99%
“…Javaid et al introduced signal correlation factors into the traditional energy detection threshold [25]. In [26], Shi et al analyzed the spectrum access systems to ensure their security and privacy against attacks. The spectrum sharing strategy in satellite systems was proposed by Wang et al [27].…”
Section: Relevant Workmentioning
confidence: 99%
“…Smart contract, one of the most popular DApps, realizes complex multiparty business logic and sees wide adoption in novel business scenarios, such as decentralized finance, digital identity, and supply chain management. The decentralized and zero-trust nature, consensus-based security, transparency, and irreversible ledger make blockchain a promising technology for enabling various dynamic spectrum sharing scenarios for 5G and beyond, as is envisioned in recent surveys [8], [9]. And crucially, blockchain smart contract provides an automated computing platform for realizing spectrum access assignment (e.g., calculating an assignment based on a request and an interference model) and enforcing spectrum regulations.…”
Section: Prospect Of Blockchain Solutions To Decentralized Sasmentioning
confidence: 99%
“…One major challenge lies in the "securitization" of spectrum access rights and the enforcement of trades, since wireless spectrum, unlike ordinary financial or physical assets, is selfexistent and intangible. Another challenge remains in realizing the business model of a blockchain-based spectrum exchange, including trader incentives, orders matching, commission fee assessment [8], [9]. To address these challenges, we expect a multidisciplinary approach involving blockchain, finance, and wireless communications.…”
Section: Broader Challenges and Opportunitiesmentioning
confidence: 99%