2007
DOI: 10.1109/mcom.2007.358855
|View full text |Cite
|
Sign up to set email alerts
|

COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - The Path to Market Success for Dynamic Spectrum Access Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
91
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 154 publications
(96 citation statements)
references
References 2 publications
0
91
0
1
Order By: Relevance
“…Major areas for innovation concern spectrum policy and ways of increasing spectrum sharing -but these are topics for another paper. 41 41 See, for example, Chapin and Lehr (2007) or Lehr and Chapin (2009b). Figure 1.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Major areas for innovation concern spectrum policy and ways of increasing spectrum sharing -but these are topics for another paper. 41 41 See, for example, Chapin and Lehr (2007) or Lehr and Chapin (2009b). Figure 1.…”
Section: Discussionmentioning
confidence: 99%
“…For example, in a series of studies conducted by Shared Spectrum Company for the US National Science Foundation in 2004 and 2005 (http://www.sharedspectrum.com/measurements/), data showed that the average occupancy over all locations tested was 5.2% and that the maximum occupancy was in New York City at 13.1%. 5 See Chapin and Lehr (2007).…”
Section: Wired Versus Wireless Networkingmentioning
confidence: 99%
“…To ameliorate such negative effects, a DSA approach called spectrum leasing has been proposed [24]. This approach allows PUs to temporarily transfer and trade the licensed spectrum usage rights of the white spaces to SUs in exchange for monetary compensation [25][26][27] or packets relaying [28,29]. To the best of our knowledge, the security features in spectrum leasing in CRNs is lacking and further security enhancements would need to be developed in order to provide a better measure of security.…”
Section: Application Of Rl-based Trm Model In Cogntive Radiomentioning
confidence: 99%
“…To prevent potential attackers from exploiting such vulnerability, each single rule should be signed with its creator's unique signature [54]. Rules not signed by a trusted authority should be immediately filtered out, while their respective sender can be black-listed.…”
Section: Fake Rules Injectionmentioning
confidence: 99%