2017 IEEE Conference on Communications and Network Security (CNS) 2017
DOI: 10.1109/cns.2017.8228658
|View full text |Cite
|
Sign up to set email alerts
|

Towards physical layer identification of cognitive radio devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…The algorithm starts out with BSs communicating the information about all connected SUs SU and PUs with other BSs in different cluster [see Fig. 12: step (1) and (2)]. The purpose of this step is to have a knowledge of updated traffic status of the cluster.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm starts out with BSs communicating the information about all connected SUs SU and PUs with other BSs in different cluster [see Fig. 12: step (1) and (2)]. The purpose of this step is to have a knowledge of updated traffic status of the cluster.…”
Section: Methodsmentioning
confidence: 99%
“…In [46], author investigates security at physical layer of cognitive radios in non-orthogonal multiple access (Non-Orthogonal Multiple Access (NOMA)) networks. Author in [2] propose Dynamic spectrum access (Dynamic Spectrum Access (DSA)) to use the existing spectrum without any interference. They use device fingerprinting to detect any change in bandwidth of the non-cognitive device in the spectrum.…”
Section: A Related Workmentioning
confidence: 99%
“…Therefore, secure authentication between multiple transmitters and users should be taken into account. There are some existing works that focus on PLA in mission critical machine-type communication (MTC) and cognitive radio networks [33,58,[102][103][104][105] .…”
Section: A Multiuser Communication Networkmentioning
confidence: 99%
“…To improve the identification accuracy, these methods often need an additional anechoic chamber to obtain pure RFF features in the training phase. In addition, a transfer learning method is proposed in [34] for the identification of devices with changing bandwidth. It is also applied to the removal of the bias introduced by RF receivers through the use of one golden reference [35].…”
Section: Introductionmentioning
confidence: 99%
“…It is also applied to the removal of the bias introduced by RF receivers through the use of one golden reference [35]. The core idea of [34] and [35] is to know the change of environment with the aid of a known reference device. This idea can also be used to address the changing location issue.…”
Section: Introductionmentioning
confidence: 99%