Robust Distributed Spectrum Sensing in Cognitive Radio Networks
- Ruiliang Chen, J. Park, Kaigui Bian
- Computer ScienceIEEE INFOCOM - The 27th Conference on Computer…
- 13 April 2008
This work proposes a new data fusion technique that uses a variable number of samples, and introduces a reputation-based mechanism to the Sequential Probability Ratio Test (SPRT), which is evaluated by comparing it with a variety of data fusion techniques under various network operating conditions.
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
- Ruiliang Chen, J. Park, Jeffrey H. Reed
- Computer ScienceIEEE Journal on Selected Areas in Communications
- 2008
A transmitter verification scheme, called LocDef (localization-based defense), which verifies whether a given signal is that of an incumbent transmitter by estimating its location and observing its signal characteristics, and suggests that LocDef is effective in identifying PUE attacks under certain conditions.
Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks
- Ruiliang Chen, J. Park
- Computer Science1st IEEE Workshop on Networking Technologies for…
- 1 September 2006
This investigation shows that a PUE attack can severely interfere with the spectrum sensing process and significantly reduce the channel resources available to legitimate unlicensed users, and proposes a transmitter verification procedure that can be integrated into the Spectrum sensing mechanism.
Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks
- Kaigui Bian, J. Park
- Computer ScienceIEEE Transactions on Mobile Computing
- 1 July 2013
The proposed approach, called asynchronous channel hopping (ACH), has two noteworthy features: any pair of CH nodes are able to rendezvous on every channel so that the rendezvous process is robust to disruptions caused by the appearance of PU signals; and an upper bounded time-to-rendezvous (TTR) is guaranteed between the two nodes even if their clocks are asynchronous.
A quorum-based framework for establishing control channels in dynamic spectrum access networks
- Kaigui Bian, J. Park, Ruiliang Chen
- Computer Science, BusinessACM/IEEE International Conference on Mobile…
- 20 September 2009
The proposed approach, called Quorum-based Channel Hopping (QCH) system, can be used for implementing rendezvous protocols in DSA networks that are robust against link breakage caused by the appearance of incumbent user signals.
IEEE 802.11bd & 5G NR V2X: Evolution of Radio Access Technologies for V2X Communications
- Gaurang Naik, Biplav Choudhury, J. Park
- Computer ScienceIEEE Access
- 20 March 2019
The latest developments in the standardization of 802.11bd and NR V2X are surveyed, shedding light on their preliminary performance projections and compare and contrast the two evolutionary RATs with their respective predecessors.
Control Channel Establishment in Cognitive Radio Networks using Channel Hopping
- Kaigui Bian, J. Park, Ruiliang Chen
- Business, Computer ScienceIEEE Journal on Selected Areas in Communications
- 1 April 2011
The proposed approach, called Quorum-based Channel Hopping (QCH) system, can be used for implementing rendezvous protocols in CR networks that are robust against link breakage caused by the appearance of incumbent user signals and outperform existing schemes under various network conditions.
Toward secure distributed spectrum sensing in cognitive radio networks
- Ruiliang Chen, J. Park, Yiwei Thomas Hou, Jeffrey H. Reed
- Computer Science, BusinessIEEE Communications Magazine
- 1 April 2008
This paper discusses security issues that may pose a serious threat to spectrum sensing, and focuses on two security threats - incumbent emulation and spectrum sensing data falsification - that may wreak havoc in distributed spectrum sensing.
Efficient multicast stream authentication using erasure codes
- J. Park, E. Chong, H. J. Siegel
- Computer ScienceTSEC
- 1 May 2003
This work describes a novel method for authenticating multicast packets that is robust against packet loss, and derives the authentication probability of the scheme using two different bursty loss models.
...
...