2008 International Conference on Convergence and Hybrid Information Technology 2008
DOI: 10.1109/ichit.2008.208
|View full text |Cite
|
Sign up to set email alerts
|

Threats Identification and their Solution in Inter-Basestation Dynamic Resource Sharing IEEE-802.22

Abstract: Cognitive Radio based IEEE 802.22 deploys the concept of maximum resource utilization through dynamic resource sharing. Inter base station resource sharing is dynamic process in IEEE 802.22 and is accomplished by exchange of control messages between the neighboring base stations. Insecure transmission of control channels open vulnerable holes for the Denial of Service attacks on base station. First the paper identifies the rogue base station and replay attacks during the resource sharing between the base stati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The OFDM system is modulated using an -point discrete-time inverse Fourier transform IDFT , and then subsequently demodulated using an -point discrete-time Fourier transform DFT . The matrix representation of the OFDM system is given as (2) where is the received band-limited signal vector after DFT , where elements , the matrix is of size are the data symbols to be fingerprinted and transmitted, is a DFT-matrix with elements , using row index and column index , the vector is the sampled channel impulse response, where each element is defined as , and is the frequency-domain representation of complex Gaussian noise.…”
Section: System Modelmentioning
confidence: 99%
“…The OFDM system is modulated using an -point discrete-time inverse Fourier transform IDFT , and then subsequently demodulated using an -point discrete-time Fourier transform DFT . The matrix representation of the OFDM system is given as (2) where is the received band-limited signal vector after DFT , where elements , the matrix is of size are the data symbols to be fingerprinted and transmitted, is a DFT-matrix with elements , using row index and column index , the vector is the sampled channel impulse response, where each element is defined as , and is the frequency-domain representation of complex Gaussian noise.…”
Section: System Modelmentioning
confidence: 99%
“…Additionally, PHY-layer approaches provide a completely independent authentication mechanism decoupled from higher-layer authentication devices or protocols, allowing the authentication mechanism to be invariant of higher-level protocol changes or revisions. In general, robust authentication devices are crucial to securing wireless systems against message forgery and the malicious actions of impostors, thereby preventing a number of identity attacks to next-generation wireless systems [1], [2], [3], [4], [5].…”
mentioning
confidence: 99%