IT-eBooks.directory Facebook Icon Image IT-eBooks.directory Google Plus Icon Image IT-eBooks.directory Twitter Icon Image
IT-eBooks.directory Logo Image

Security-aware Cooperation in Cognitive Radio Networks

Security-aware Cooperation in Cognitive Radio Networks Image

Book details:

Publisher:Springer
Category: Springer
Author:
Edition:1
ISBN-10:1493904124
ISBN-13:9781493904129
Pages:75
Published:
Posted:Jun 30 2016
Language:English
Book format:PDF
Book size:1.79 MB

Book Description:

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An introduction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and professionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.

Download Link:

Related Books:

Location Privacy Preservation in Cognitive Radio Networks Image

Location Privacy Preservation in Cognitive Radio Networks

Jun 30 2016 This brief focuses on the current research on location privacy preservation in cognitive radio networks (CRNs). Along with a review of the existing works, this book includes fundamental privacy models, possible frameworks, useful performance, and future research directions. It explores privacy preservation techniques, collaborative spectrum sensing, database-driven CRNS, and modeling potential privacy threats. Conflicts between database owners and unlicensed users can compromise location privacy, and CRNs are a means to mitigate the spectrum scarcity issue due to the increasing demand for wire...

Advances in Mobile Radio Access Networks Image

Advances in Mobile Radio Access Networks

Jun 30 2016 The telecom industry is on the rebound and the demand for more and newer wireless services is ever increasing. To meet these market demands, wireless providers have to deploy advanced radio access networks to enhance the mobile communications infrastructure. This forward-looking book delivers a comprehensive overview of the evolution of mobile radio access networks, focusing on high-level architectural issues that engineers and managers need to understand. The book highlights the advantages of advanced radio access network technologies and helps professionals overcome practical system design p...

Developing and Evaluating Security-Aware Software Systems Image

Developing and Evaluating Security-Aware Software Systems

Jun 30 2016 As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field.Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields....

Security in Wireless Mesh Networks Image

Security in Wireless Mesh Networks

Jun 30 2016 Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications. Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include authenticati...

IT-eBooks.directory