ASPECTS: Agile spectrum security

Document type: Conference Papers
Peer reviewed: Yes
Author(s): George Polyzos, Marias Giannis, Stamatios Arkoulis, Pantelis Frangoudis, Markus Fiedler, Adrian Popescu, Hermann de Meer, Ralph Herkenhöner, Andreas Fischer, Jens Oberender
Title: ASPECTS: Agile spectrum security
Conference name: EURO-NGI Conference on Next Generation Internet Networks, NGI
Year: 2011
Pagination: Article number 5985872
ISBN: 978-145770917-3
Publisher: IEEE
City: Kaiserslautern
URI/DOI: 10.1109/NGI.2011.5985872
Organization: Blekinge Institute of Technology
Department: School of Computing (Sektionen för datavetenskap och kommunikation)
School of Computing S-371 79 Karlskrona
+46 455 38 50 00
http://www.bth.se/com
Language: English
Abstract: Cognitive Radio (CR) promises to provide better spectrum utilization and increase the availability of (on demand) broadband access to the Network of the Future. CR relies on devices that can sense their (radio) environment, understand it, and model it, so that they can exploit the spectrum through appropriate transmission parameters (in the space, time, and frequency domains) that do not interfere with legacy and/or licensed devices using the same spectrum in the same general area. According to the CR paradigm, the use of the spectrum that is not used by primary (licensed) users is opportunistic. Secondary users sense the spectrum and decide to use it on their own, possibly following additional rules and protocols. Because multiple such CR devices (secondary users) can find themselves in the same area and compete for the same spectrum, the question that arises is whether these devices behave fairly and appropriately. The opportunities are there for competing CR devices to try to grab more resources through the spreading of misinformation and impersonation of licensed devices.
Subject: Computer Science\Networks and Communications
Keywords: Broadband access, Cognitive radio, Frequency domains, Spectrum utilization, Transmission parameters
Edit