eBooks-it.org Logo
eBooks-IT.org Inner Image

Security-aware Cooperation in Cognitive Radio Networks

Security-aware Cooperation in Cognitive Radio Networks Image

Book Details:

Publisher:Springer
Series: Springer
Author:Jon W. Mark
Edition:1
ISBN-10:1493904124
ISBN-13:9781493904129
Pages:75
Published:Feb 28 2014
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:1.79 MB

Book Description:

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An introduction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and professionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.

Download Link:

Related Books:

Location Privacy Preservation in Cognitive Radio Networks

Location Privacy Preservation in Cognitive Radio Networks Image
This brief focuses on the current research on location privacy preservation in cognitive radio networks (CRNs). Along with a review of the existing works, this book includes fundamental privacy models, possible frameworks, useful performance, and future research directions. It explores privacy preservation techniques, collaborative spectrum sensing, database-driven CRNS, and modeling potential privacy threats. Conflicts between database owners and unlicensed users can compromise location privacy, and CRNs are a means to mitigate the spectrum scarcity issue due to the increasing demand for wireless channel resources. By examining the current and potential privacy threats, the authors equip readers to understand this developing issue. The brief is desi...

Advances in Mobile Radio Access Networks

Advances in Mobile Radio Access Networks Image
The telecom industry is on the rebound and the demand for more and newer wireless services is ever increasing. To meet these market demands, wireless providers have to deploy advanced radio access networks to enhance the mobile communications infrastructure. This forward-looking book delivers a comprehensive overview of the evolution of mobile radio access networks, focusing on high-level architectural issues that engineers and managers need to understand. The book highlights the advantages of advanced radio access network technologies and helps professionals overcome practical system design problems. By striking a balance between theory and implementation, and between cutting-edge technology and economics, it addresses the concerns of system enginee...

Developing and Evaluating Security-Aware Software Systems

Developing and Evaluating Security-Aware Software Systems Image
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field.Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields....



2007 - 2021 © eBooks-IT.org