2008 the Second International Conference on Next Generation Mobile Applications, Services, and Technologies 2008
DOI: 10.1109/ngmast.2008.102
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Spectrum and Its Security Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(20 citation statements)
references
References 16 publications
0
19
0
1
Order By: Relevance
“…A first attempt to identify and categorize non-conformant nodes in the Cognitive Radio Networking context is made by Arkoulis et al [28]. Their classification is slightly modified and briefly summarized below:…”
Section: Attacker Profilesmentioning
confidence: 99%
See 4 more Smart Citations
“…A first attempt to identify and categorize non-conformant nodes in the Cognitive Radio Networking context is made by Arkoulis et al [28]. Their classification is slightly modified and briefly summarized below:…”
Section: Attacker Profilesmentioning
confidence: 99%
“…Obviously, each single node may send one or no such requests, depending on its current needs. One problem that arises here is that an attacker could inject fake requests (and information) [28] into the DSA network aiming at either confusing the sharing mechanism, or misleading it to assign the available opportunities to the wrong nodes. In the latter case, the fake requests might seem to be sent from an existing and valid entity of the network (a victim in this case), while in the former case this is not a requirement.…”
Section: Fake Spectrum Requests Injectionmentioning
confidence: 99%
See 3 more Smart Citations