2008 46th Annual Allerton Conference on Communication, Control, and Computing 2008
DOI: 10.1109/allerton.2008.4797562
|View full text |Cite
|
Sign up to set email alerts
|

Crime and Punishment for Cognitive Radios

Abstract: Crime and Punishment for Cognitive Radios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 40 publications
(17 citation statements)
references
References 41 publications
0
17
0
Order By: Relevance
“…Woyach et al [20] studied how to entice secondary users to observe the spectrum etiquette by giving them incentives. In a similar context, Liu et al [21] studied the problem of detecting unauthorized use of a licensed spectrum.…”
Section: Related Workmentioning
confidence: 99%
“…Woyach et al [20] studied how to entice secondary users to observe the spectrum etiquette by giving them incentives. In a similar context, Liu et al [21] studied the problem of detecting unauthorized use of a licensed spectrum.…”
Section: Related Workmentioning
confidence: 99%
“…We then analyze a jail-based mechanism and compare the performance to fines in Section IV. This is an extension of earlier work [32] where jails were used to discourage cheating if sensing were free. We conclude the paper in Section V by looking at the possibilities of aligning the incentives of primary and cognitive users for the purposes of cooperative system design.…”
Section: Introductionmentioning
confidence: 95%
“…This avoids the overhead of a mandated identification beacon. The concept of using taboo codes has been suggested in [23] claiming it to be highly efficient. For our study, the process of exchange of terms before a DSL agreement is reached makes it easy to use any of the above mentioned approaches to identify the selfish nodes.…”
Section: ) Identifying Selfish Nodesmentioning
confidence: 99%