2007 4th IEEE Consumer Communications and Networking Conference 2007
DOI: 10.1109/ccnc.2007.209
|View full text |Cite
|
Sign up to set email alerts
|

Digital Signatures for Centralized DSA Networks

Abstract: Abstract-Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(22 citation statements)
references
References 6 publications
0
22
0
Order By: Relevance
“…Their approaches involve the activities of a CA, PUs, and both PUs' and SUs' base stations. However, the main differences of these mechanisms are that the BSs are connected to the CA using wire links in [15], while in the [99] approach, an asymmetric key scheme instead of a CA is mainly used.…”
Section: ) Digital Signaturementioning
confidence: 99%
See 3 more Smart Citations
“…Their approaches involve the activities of a CA, PUs, and both PUs' and SUs' base stations. However, the main differences of these mechanisms are that the BSs are connected to the CA using wire links in [15], while in the [99] approach, an asymmetric key scheme instead of a CA is mainly used.…”
Section: ) Digital Signaturementioning
confidence: 99%
“…Incorporating these security features can lead to the exchange of complete and reliable secure MAC frames among cognitive users [9,13,94]. Thus, several studies have been conducted for secure MAC protocols in CRNs [11,[14][15][94][95][96][97][98][99][100][101]. They are classified into two categories, based on protection and detection techniques for addressing the security requirements and to defend the existing security issues in MAC protocols in CRNs.…”
Section: C) Dynamic Local CCCmentioning
confidence: 99%
See 2 more Smart Citations
“…An Overlapping attack [2] will harm another CR network if two CR networks overlap. In the MAC layer, the asynchronous sensing attack [3] can disturb normal sensing operation by purposefully transmitting in a sensing period. In cooperative spectrum sensing, to examine the existence of the primary user, a node takes its neighbors' sensing results as a reference in addition to its own sensing.…”
Section: Introductionmentioning
confidence: 99%