2016
DOI: 10.1109/twc.2015.2466550
|View full text |Cite
|
Sign up to set email alerts
|

“See Something, Say Something” Crowdsourced Enforcement of Spectrum Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…1 (b). In some cases, a selfish attacker may break the upper bound of the transmit power constraint for a higher data rate [20] [21]. Similarly, some malicious attackers may intentionally apply for spectrum exploitation with a large coverage, quoting a high transmit power, but in fact they work with a low transmit power, which decreases the spectrum efficiency of spatial reuse [22].…”
Section: A Background and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…1 (b). In some cases, a selfish attacker may break the upper bound of the transmit power constraint for a higher data rate [20] [21]. Similarly, some malicious attackers may intentionally apply for spectrum exploitation with a large coverage, quoting a high transmit power, but in fact they work with a low transmit power, which decreases the spectrum efficiency of spatial reuse [22].…”
Section: A Background and Motivationmentioning
confidence: 99%
“…On the other side, few works have been done for the rogue power emission problem. In [20], crowdsourced enforcement, where a crowd of mobile users collaterally make detection, is exploited to find out the spectrum misuse behavior and the related characteristics, e.g., the signal strength, are analyzed.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There is also a crowdsourcing-based framework named SpecGuard [21] which explores dynamic power control at SUs to contain the spectrum permit in physical layer signals. Another crowdsourced enforcement framework [22] improves the probability of detection while reducing the likelihood of false positives for spectrum misuses and it can detect misuses caused by mobile users. Moreover, applying big data analysis and machine learning to cloud-based radio access networks also provide an appropriate approach to enable long-term spectrum monitoring [23].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, there has been a great deal of interest in leveraging crowd-sourcing of mobile phones as a kind of ad-hoc sensor network to provide robust, dynamic, and, most importantly, rapid detection of spectrum violators [1,11,19]. While promising, a key challenge to the study of such sensor network data is the coverage problem.…”
Section: Introductionmentioning
confidence: 99%